Windows Identity Foundation Patterns: On-Premise and Cloud

This course aims to demystify on-premise and cloud-based identity solutions.
Course info
Rating
(111)
Level
Intermediate
Updated
Aug 30, 2012
Duration
4h 46m
Table of contents
Course Overview
Protect REST Resource - Authentication and Delegation
Federate with multiple Identity Providers
Token and Claims Transformation
Security Token Management and Cloud Scalability
Further Reading and References
Description
Course info
Rating
(111)
Level
Intermediate
Updated
Aug 30, 2012
Duration
4h 46m
Description

Dealing with multiple identities has always been challenging; even more so with the advent of the cloud. Developers and architects are often confused by the numerous terms, acronyms and buzzwords - such as Active/Passive Federation, SWT, SAML, ADFS, WIF, WS-Trust, WS-Federation, OAuth, OAuth WRAP and others. This course starts by distilling the technology jargon; setting the foundation for understanding various identity solutions. Having laid the foundation, this course then focuses on typical claims-based identity solution patterns within enterprises. Understanding these recurring implementation themes will further simply the mapping of claims-based identity to your LOB applications.

About the author
About the author

Niraj works as an Enterprise Architect for a Fortune 500 company and has an innate passion for building / studying software systems. He is also a manager/speaker at BDOTNET, India’s largest .NET user group.

More from the author
Microsoft Azure Diagnostics
Intermediate
3h 18m
9 Mar 2012
Design Patterns Library
Intermediate
15h 38m
10 Sep 2010
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi. This is Niraj from Pluralsight. Welcome to this course on Windows Identity Foundation Patterns: On-Premise And Cloud. Identity management has always been tough with the On-Premise applications and with the invent of Cloud, this has become even more challenging. In this course, we are going to understand solutions to some of the recurring identity challenges we face while developing our applications On-Premise and in Cloud.

Protect REST Resource - Authentication and Delegation
Hi, this is Niraj from Pluralsight. Welcome to this module on Protecting REST Resources wherein we are going to look at both Authentication and Delegation. In this module, we are going to see how can we secure the REST resources by authenticating the incoming users and how many time so we can allow the users to access REST resources on our behalf using delegation. In case you haven't been through the course or the module, I would strongly encourage that you go through that module first and then come back to this module to get more. Let's get started by looking at the outline. In this module, we are going to see how can we secure our REST resources using the OAuth protocol. We would also explore as to what the Access Control Service has to offer in terms of protecting the REST resources via OAuth protocol. Then we have some specific implementations and demos lined up as to how can we use the Access Control Service for authentication and also how can we use ACS for delegation. Let's get started.

Federate with multiple Identity Providers
Hi, this is Niraj for Pluralsight. Welcome to this module on Federate with multiple Identity Providers. In this module, we are going to see how can we integrate with the corporate identity providers like Active Directory Federation Services and also the web identity providers like Google. We will also see how to implement this integration for both Web Clients, that's web browsers and for the Rich Clients for applications like WPF. So, let's get started by looking at the course outline. We will start by understanding the need for a Federation Provider. From thereon, we would see how can we use the Access Control Service as a Federation Provider. We would also see that how the federation can be established using both Web Clients that is web browsers. And Rich Clients with applications like WPF. While I'm going to use WPF as an example of Rich Client, the same techniques would apply to an either Rich Clients including Window Forms, Windows Phone all of it Windows 8.

Token and Claims Transformation
Hi. This is Niraj for Pluralsight. Welcome to this module on Token and Claims Transformation. In order to get most out of this module, I would strongly encourage that you first go through the course overview module and also the module on protecting REST resource and federating with multiple identity providers. Let's get started by looking at the outline. In this module, we are going to understand why Token and Claims Transformation are essential for establishing successful federation across organizations. We are also going to see how can we use the Access Control Service for both the Token transformation and also for the Claims transformation.

Security Token Management and Cloud Scalability
Hi. This is Niraj for Pluralsight. Welcome to this module on Security Token Management and Cloud Scalability. In this module, we are going to understand some of the technical challenges of moving one application to Cloud in relation to the identity management. Before starting with this module, I would strongly encourage you to go through the course overview module and the module with the pattern on federating with multiple identity providers. So, let's see the outline for this module. In this module, we are going to see how the client and the applications can manage secure sessions so that clients don't end up re-authenticating with the identity providers on every request. We will also see how can we address the issues regarding the verbosity of tokens like SAML. In terms of implementation, we will see how can we use the X509 certificates to securely establish a session between the relying party and the clients. And finally, we will see how can we build a distributed server token cache using Windows Azure Caching Preview.