programming4us
           
 
 
Windows

Windows Azure : Programming Access Control Service (part 1)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/4/2010 11:41:10 AM

1. Creating an ACS solution Using SWT

In this example, you learn to use ACS to protect access to a REST web service. Consider an example in which you're exposing a web service named ACSMachineInfo that returns simple machine information to the clients. You want to offer this web service to as wide an audience as possible without worrying about maintaining authentication and authorization for each user. But because this service is part of an enterprise offering, you want the users accessing the service to be authenticated and authorized. ACS can abstract the authentication and authorization logic for your service by offering a generic claims-mapping engine between identity providers and your web service. Your web service is authentication provider agnostic and only accepts SWT tokens and claims issued by ACS to your web service. You web service is configured to trust tokens issued by ACS and only authorizes users adhering to the claims issued by ACS. Figure 1 illustrates the high-level architecture of the interaction between your web service, ACS, and the service consumer client.

Figure 1. ACS with SWT architecture

Figure 1 is common architecture for using ACS with web services.

Figure 2. ACS using SWT solution folder

In Figure 2, the service project represents the web service that is protected by ACS, the client project is the web service consumer, and the ACSAuthManager is a utility class library project with utility classes for validating tokens in WCF.

The operations supported by the web service and the roles that can access them are listed in Table 1.

Table 1. Web Service Operations and Roles
OperationRoles That Can Access the Operation
GetMachineName()User, Administrator
GetUserDomainName()User, Administrator
GetOSVersion()User, Administrator
EncodeString()Administrator

Only Administrators are allowed to access EncodeString(). All other methods can be accessed by the User and Administrator roles. After you've designed the authorization scheme for your web service, you can proceed with the standard steps required to integrate your web service with ACS and make it available to consumer applications.

Other -----------------
- Windows 7 : Working with Registry Entries (part 3)
- Windows 7 : Working with Registry Entries (part 2)
- Windows 7 : Working with Registry Entries (part 1) - Changing the Value of a Registry Entry
- Windows 7 : Keeping the Registry Safe
- Windows 7 : Getting to Know the Registry (part 2)
- Windows 7 : Getting to Know the Registry (part 1) - Understanding Registry Settings
- Windows 7 : Firing Up the Registry Editor
- Windows Azure : Managing Access Control Service Resources (part 2)
- Windows Azure : Managing Access Control Service Resources (part 1)
- Windows Azure : Access Control Service Management Portal
- Windows 7 : Reset a Broken Service
- Windows 7 : Make Windows Shut Down Services Faster
- Windows 7 : Disable Services for Faster Performance
- Windows 7 : Controlling Services with a Script
- Windows 7 : Controlling Services at the Command Prompt
- Windows 7 : Controlling Services with the Services Snap-In
- Windows Azure : Access Control Service Usage Scenarios (part 3)
- Windows Azure : Access Control Service Usage Scenarios (part 2)
- Windows Azure : Access Control Service Usage Scenarios (part 1)
- Windows Azure : Access Control Service - Claims-Based Identity Model
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us