programming4us
           
 
 
Windows

Windows Azure : Access Control Service - Claims-Based Identity Model

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/1/2010 11:34:01 AM
This section goes over the details of the claims-based identity model in ACS. Figure 1 illustrates the interaction between different components in a claims-based identity model. With the terminology defined, it will be much easier for you to understand the flow of information between different parties in this model.
Figure 1. ACS claims-based identity message flow

As illustrated in Figure 1, several messages and tokens are passed back and forth between the key parties in a claims-based identity model. Before the interaction starts, prerequisites (listed as step 0) are required in order to make the end-to-end scenario work. The following steps describe the flow of information from the requesting user or application to the relying party:

Step 0: Two important prerequisites for claims-based identity to work are completed in this step. First, trust is established between the relying party (web service), ACS, and identity providers. The trust relationships are refreshed on a periodic basis. The trust between ACS and the relying party is established using a signing key. Second, an administrator creates an issuer to identify service consumers and defines the mapping rules between input claims and output claims in the form of rules in ACS. The issuer key material is distributed to the service consumer.

Step 1: When ACS, the relying party, and identity providers are configured for the claims-based identity model to work seamlessly, the service consumer must use the issuer key material to acquire a token from ACS in order to call the web service. In the current version (November 2009 CTP), the ACS supports three types of token requests:

  • Plain text: The service consumer sends an issuer key directly to ACS to authenticate the request.

  • Signed: The service consumer creates an SWT, signs the token, and sends the token to ACS for authentication. In this method, unlike with the plain text request, the service consumer doesn't need to send an issuer key directly to ACS. Typically, the signed token from the consumer includes input claims that are then mapped to output claims by ACS and included in the output token emitted by ACS.

  • SAML: The service consumer acquires a signed SAML token from ADFS 2.0 or a similar identity provider that emits SAML tokens, and sends it to ACS for authentication. Intended primarily for ADFS 2.0 integration, this approach requires that a signed SAML bearer token be acquired and sent to ACS for authentication.

Step 2: Based on the claims-mapping rules configured in ACS, ACS maps the input claims received in the service consumer token to output claims specific to the web service. The ACS then issues an SWT [] consisting of output claims to the service consumer. ACS signs the token using the key registered in Step 0. The mapping of input claims to output claims makes ACS an R-STS. ACS abstracts the token-issuing party from the token-consuming party by always emitting an SWT containing output claims the web service expects.

[] Simple Web Token specification: http://groups.google.com/group/oauth-wrap-wg

Step 3: Regardless of the method used to acquire the input token, ACS creates a SWT and sends it to the service consumer. This SWT contains output claims that the web service expects.

Step 4: The service consumer packages the SWT into an HTTP header and sends it to the web service along with the message payload.

Step 5: The web service validates the token based on the secret key exchange established in Step 0. The web service also validates the required claims and grants or denies access to the resource based on the validation outcome. There is no direct communication between the web service and ACS during the method invocation. The only communication happens during the periodic refresh of the secret key exchange.

Figure 1 may look complex initially, but when you go through the steps, the claims-based identity is easy to understand. The next section puts the claims-based identity model into an enterprise scenario perspective.

Other -----------------
- Windows Azure : Access Control Service - Concepts and Terminology
- Windows 7 : Configuring the MMC - Creating a Custom Taskpad View
- Windows 7 : Configuring the MMC - Controlling Snap-Ins with Group Policies
- Windows 7 : Configuring the MMC - Adding a Snap-In
- Configuring the Microsoft Management Console : Reviewing the Windows 7 Snap-Ins
- Windows 7 : Enabling the Shutdown Event Tracker
- Windows 7 : Increasing the Size of the Recent Documents List
- Windows 7 : Customizing the Places Bar
- Windows 7 : Customizing the Windows Security Window
- Windows 7 : Working with Group Policies
- Policing Windows 7 with Group Policies
- Windows Azure Storage : Queue Scenarios
- Windows Azure Storage : Message Operations (part 2) - Get Messages
- Windows Azure Storage : Message Operations (part 1) - Put Message
- Windows Azure Storage : Queue Operations
- Windows Azure Storage : Account Operations
- Windows 7 : Removing an Icon from Control Panel
- Windows 7 : Showing Only Specified Control Panel Icons
- Windows 7 : Easier Access to Control Panel
- Windows 7 : Understanding Control Panel Files
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us