A Guide to Claims-Based Identity and Access Control, 2nd Edition Front Cover

A Guide to Claims-Based Identity and Access Control, 2nd Edition

Description

As an application designer or developer, imagine a world where you don’t have to worry about authentication. Imagine instead that all requests to your application already include the information you need to make access control decisions and to personalize the application for the user. In this world, your applications can trust another system component to securely provide user information, such as the user’s name or e-mail address, a manager’s e-mail address, or even a purchasing authorization limit. The user’s information always arrives in the same simple format, regardless of the authentication mechanism, whether it’s Microsoft Windows integrated authentication, forms-based authentication in a Web browser, an X.509 client certificate, Windows Azure Access Control Service, or something more exotic. Even if someone in charge of your company’s security policy changes how users authenticate, you still get the information, and it’s always in the same format. This is the utopia of claims-based identity that A Guide to Claims-Based Identity and Access Control describes. As you’ll see, claims provide an innovative approach for building applications that authenticate and authorize users. This book gives you enough information to evaluate claims-based identity as a possible option when you’re planning a new application or making changes to an existing one. It is intended for any architect, developer, or information technology (IT) professional who designs, builds, or operates web applications, web services, or SharePoint applications that require identity information about their users.

Table of Contents

Chapter 1 An Introduction to Claims
Chapter 2 Claims-Based Architectures
Chapter 3 Claims-based Single Sign-on for the Web and Windows Azure
Chapter 4 Federated Identity for Web Applications
Chapter 5 Federated Identity with Windows Azure Access Control Service
Chapter 6 Federated Identity with Multiple Partners
Chapter 7 Federated Identity with Multiple Partners and Windows Azure Access Control Service
Chapter 8 Claims Enabling Web Services
Chapter 9 Securing REST Services
Chapter 10 Accessing Rest Services from a Windows Phone Device
Chapter 11 Claims-Based Single Sign-On for Microsoft SharePoint 2010
Chapter 12 federated identity for sharepoint applications

To access the link, solve the captcha.