SlideShare a Scribd company logo
Twitter: @spbrianculver
E-mail: brian.culver@expertpointsolutions.com
Blog: spbrian.blogspot.com
Thank you for being a part of the first ever
SharePoint Saturday for the greater Houston
                   area!
Remote
Employees


Partners


Vendors &
Customers
Claim-based Authentication
Claim-based Authentication
                                                                        Trust




                                3


                                                                                                                                        SharePoint
                                    Au
                                       th
                                          e
                                         nt
                                           ic
                                4



                                              at


        Identity Provider
                                                io
                                Se



                                                 n


     Security Token Service
                                   cu



                                                 R
                                                     eq
                                      rity




            (IP-STS)
                                                      ue
                                          to



                                                          st
                                             ken




                                                                            5   Service token request                                              Claims
                                                                                                                                                  Providers
                                                                            6 Security token response
                                                                                                                           SharePoint
                    ASP.net                                    Client            1 R
Active Directory                                                                     eque                                    STS          Trust
                   Membership                                                             st   Reso
                                                                         2 A                           urce
                                                                            uthe
                                                                                 ntica
                                                                                       te   Requ
                                                                                                   est/R                                 SharePoint
                                                                                                           e d i re
       LiveID       SAML                                                                                              ct                Authorization
                    Based
                                                                                 7 Request Resource with
                                                                                   service token
Mixed Authentication                                                     Multi-Authentication
      SharePoint                                                               SharePoint
      Farm                                                                     Farm




          Web Application                                                          Web Application
                                                Windows                                                                  Windows Authentication
                       Zone: Default            Authentication                                  Zone: Default
                                                                                Regular label-callout text               FBA Authentication


                   Extended Web Application                                                 Extended Web Application
                               Zone: Extranet           FBA                                             Zone: Extranet          SAML Based Authentication
                                                        Authentication                                                          FBA Authentication


                   Extended Web Application                                                 Extended Web Application
                               Zone: Intranet            ...                                            Zone: Intranet           Windows Authentication



                   Extended Web Application                                                 Extended Web Application
                               Zone: Internet            ...                                            Zone: Internet           ...
                   Extended Web Application                                                 Extended Web Application
                                Zone: Custom             ...                                             Zone: Custom            ...
s
s
Please complete and turn
in your Session Evaluation
Form so we can improve
future events.
Presenter:
  Brian Culver
Session Name:
  Extranets & Claims
  Authentication
SharePoint Saturday Houston: SharePoint 2010 Extranets & Claims Authentication

More Related Content

Viewers also liked

How We Did It - GreatAmerica's Nontraditional Site Structure
How We Did It - GreatAmerica's Nontraditional Site StructureHow We Did It - GreatAmerica's Nontraditional Site Structure
How We Did It - GreatAmerica's Nontraditional Site Structure
Wendy Neal
 
SharePoint 2010 Team Site Overview
SharePoint 2010 Team Site OverviewSharePoint 2010 Team Site Overview
SharePoint 2010 Team Site Overview
Ivor Davies
 
How to create user friendly, engaging share point sites (no coding needed!)
How to create user friendly, engaging share point sites (no coding needed!)How to create user friendly, engaging share point sites (no coding needed!)
How to create user friendly, engaging share point sites (no coding needed!)
Wendy Neal
 
Make SharePoint Look Not Like SharePoint - SPSNashville - Cathy Dew
Make SharePoint Look Not Like SharePoint - SPSNashville - Cathy DewMake SharePoint Look Not Like SharePoint - SPSNashville - Cathy Dew
Make SharePoint Look Not Like SharePoint - SPSNashville - Cathy Dew
Cathy Dew
 
Becoming a SharePoint Design Ninja
Becoming a SharePoint Design NinjaBecoming a SharePoint Design Ninja
Becoming a SharePoint Design Ninja
Kanwal Khipple
 
Share point saturday edmonton 2016 designing team sites
Share point saturday edmonton 2016   designing team sitesShare point saturday edmonton 2016   designing team sites
Share point saturday edmonton 2016 designing team sites
Mark Morris CBA CPM
 
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...
rwuhrman
 
Cool Dashboards and Visualizations for SharePoint Power Users
Cool Dashboards and Visualizations for SharePoint Power UsersCool Dashboards and Visualizations for SharePoint Power Users
Cool Dashboards and Visualizations for SharePoint Power Users
Benjamin Niaulin
 
Build Killer Visuals with SharePoint 2013 Search & Display Templates
Build Killer Visuals with SharePoint 2013 Search & Display TemplatesBuild Killer Visuals with SharePoint 2013 Search & Display Templates
Build Killer Visuals with SharePoint 2013 Search & Display Templates
Benjamin Niaulin
 
Designing Intuitive SharePoint Sites
Designing Intuitive SharePoint SitesDesigning Intuitive SharePoint Sites
Designing Intuitive SharePoint Sites
Marcy Kellar
 
Share Point Presentation Introduction To Sharepoint
Share Point Presentation    Introduction To SharepointShare Point Presentation    Introduction To Sharepoint
Share Point Presentation Introduction To Sharepoint
rpeterson1
 
Discover SharePoint 2016 Preview and the Vision
Discover SharePoint 2016 Preview and the VisionDiscover SharePoint 2016 Preview and the Vision
Discover SharePoint 2016 Preview and the Vision
Benjamin Niaulin
 
SharePoint Site Collections - Best Practices and Recommendations
SharePoint Site Collections - Best Practices and RecommendationsSharePoint Site Collections - Best Practices and Recommendations
SharePoint Site Collections - Best Practices and Recommendations
Chris Woodill
 
SharePoint Branding From Start to Finish
SharePoint Branding From Start to FinishSharePoint Branding From Start to Finish
SharePoint Branding From Start to Finish
Kanwal Khipple
 
10 Best SharePoint Features You’ve Never Used (But Should)
10 Best SharePoint Features You’ve Never Used (But Should)10 Best SharePoint Features You’ve Never Used (But Should)
10 Best SharePoint Features You’ve Never Used (But Should)
Christian Buckley
 

Viewers also liked (15)

How We Did It - GreatAmerica's Nontraditional Site Structure
How We Did It - GreatAmerica's Nontraditional Site StructureHow We Did It - GreatAmerica's Nontraditional Site Structure
How We Did It - GreatAmerica's Nontraditional Site Structure
 
SharePoint 2010 Team Site Overview
SharePoint 2010 Team Site OverviewSharePoint 2010 Team Site Overview
SharePoint 2010 Team Site Overview
 
How to create user friendly, engaging share point sites (no coding needed!)
How to create user friendly, engaging share point sites (no coding needed!)How to create user friendly, engaging share point sites (no coding needed!)
How to create user friendly, engaging share point sites (no coding needed!)
 
Make SharePoint Look Not Like SharePoint - SPSNashville - Cathy Dew
Make SharePoint Look Not Like SharePoint - SPSNashville - Cathy DewMake SharePoint Look Not Like SharePoint - SPSNashville - Cathy Dew
Make SharePoint Look Not Like SharePoint - SPSNashville - Cathy Dew
 
Becoming a SharePoint Design Ninja
Becoming a SharePoint Design NinjaBecoming a SharePoint Design Ninja
Becoming a SharePoint Design Ninja
 
Share point saturday edmonton 2016 designing team sites
Share point saturday edmonton 2016   designing team sitesShare point saturday edmonton 2016   designing team sites
Share point saturday edmonton 2016 designing team sites
 
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...
 
Cool Dashboards and Visualizations for SharePoint Power Users
Cool Dashboards and Visualizations for SharePoint Power UsersCool Dashboards and Visualizations for SharePoint Power Users
Cool Dashboards and Visualizations for SharePoint Power Users
 
Build Killer Visuals with SharePoint 2013 Search & Display Templates
Build Killer Visuals with SharePoint 2013 Search & Display TemplatesBuild Killer Visuals with SharePoint 2013 Search & Display Templates
Build Killer Visuals with SharePoint 2013 Search & Display Templates
 
Designing Intuitive SharePoint Sites
Designing Intuitive SharePoint SitesDesigning Intuitive SharePoint Sites
Designing Intuitive SharePoint Sites
 
Share Point Presentation Introduction To Sharepoint
Share Point Presentation    Introduction To SharepointShare Point Presentation    Introduction To Sharepoint
Share Point Presentation Introduction To Sharepoint
 
Discover SharePoint 2016 Preview and the Vision
Discover SharePoint 2016 Preview and the VisionDiscover SharePoint 2016 Preview and the Vision
Discover SharePoint 2016 Preview and the Vision
 
SharePoint Site Collections - Best Practices and Recommendations
SharePoint Site Collections - Best Practices and RecommendationsSharePoint Site Collections - Best Practices and Recommendations
SharePoint Site Collections - Best Practices and Recommendations
 
SharePoint Branding From Start to Finish
SharePoint Branding From Start to FinishSharePoint Branding From Start to Finish
SharePoint Branding From Start to Finish
 
10 Best SharePoint Features You’ve Never Used (But Should)
10 Best SharePoint Features You’ve Never Used (But Should)10 Best SharePoint Features You’ve Never Used (But Should)
10 Best SharePoint Features You’ve Never Used (But Should)
 

Similar to SharePoint Saturday Houston: SharePoint 2010 Extranets & Claims Authentication

Thomas vochten claims-spsbe26
Thomas vochten claims-spsbe26Thomas vochten claims-spsbe26
Thomas vochten claims-spsbe26
BIWUG
 
Troubleshooting Federation, ADFS, and More
Troubleshooting Federation, ADFS, and More Troubleshooting Federation, ADFS, and More
Troubleshooting Federation, ADFS, and More
Microsoft TechNet - Belgium and Luxembourg
 
Pm 02 track1-- 魏刚--osac-trusted-computing-pools-in-folsom-v2
Pm 02 track1-- 魏刚--osac-trusted-computing-pools-in-folsom-v2Pm 02 track1-- 魏刚--osac-trusted-computing-pools-in-folsom-v2
Pm 02 track1-- 魏刚--osac-trusted-computing-pools-in-folsom-v2OpenCity Community
 
Case Study - Appirio as the Serverless Enterprise
Case Study - Appirio as the Serverless EnterpriseCase Study - Appirio as the Serverless Enterprise
Case Study - Appirio as the Serverless Enterprise
Appirio
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1bSOA Symposium
 
Geospatial Community Cloud Vision
Geospatial Community Cloud VisionGeospatial Community Cloud Vision
Geospatial Community Cloud Vision
Daneyon Hansen
 
Building tomorrow's web with today's tools
Building tomorrow's web with today's toolsBuilding tomorrow's web with today's tools
Building tomorrow's web with today's tools
James Pearce
 
First Operational Technology (OT) High Performance Messaging Patterns for Ent...
First Operational Technology (OT) High Performance Messaging Patterns for Ent...First Operational Technology (OT) High Performance Messaging Patterns for Ent...
First Operational Technology (OT) High Performance Messaging Patterns for Ent...
Real-Time Innovations (RTI)
 
Complex End-to-End Testing
Complex End-to-End TestingComplex End-to-End Testing
Complex End-to-End Testing
Erika Barron
 
Information Society with Absolute Trust in the Services
Information Society with Absolute Trust in the ServicesInformation Society with Absolute Trust in the Services
Information Society with Absolute Trust in the Services
lucgathy
 
IdM in Smart Applications on Virtual Infrastructure
IdM in Smart Applications on Virtual InfrastructureIdM in Smart Applications on Virtual Infrastructure
IdM in Smart Applications on Virtual InfrastructureMohammad Faraji
 
E-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netE-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the net
Raman K. Attri
 
Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...
Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...
Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...
CA API Management
 
CensorNet ISP Filtering
CensorNet ISP FilteringCensorNet ISP Filtering
CensorNet ISP Filtering
tlloyduk
 
Сравнение возможностей SPS 2010 по редакциям
Сравнение возможностей SPS 2010 по редакциямСравнение возможностей SPS 2010 по редакциям
Сравнение возможностей SPS 2010 по редакциямМаксим Войцеховский
 
The CORA Model Explained
The CORA Model ExplainedThe CORA Model Explained
The CORA Model Explained
telzinga
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
APIsecure_ Official
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
Hitachi, Ltd. OSS Solution Center.
 
Acl Presentation 3 4 10 Final
Acl Presentation 3 4 10 FinalAcl Presentation 3 4 10 Final
Acl Presentation 3 4 10 Finalmcoello
 

Similar to SharePoint Saturday Houston: SharePoint 2010 Extranets & Claims Authentication (20)

Thomas vochten claims-spsbe26
Thomas vochten claims-spsbe26Thomas vochten claims-spsbe26
Thomas vochten claims-spsbe26
 
Troubleshooting Federation, ADFS, and More
Troubleshooting Federation, ADFS, and More Troubleshooting Federation, ADFS, and More
Troubleshooting Federation, ADFS, and More
 
Pm 02 track1-- 魏刚--osac-trusted-computing-pools-in-folsom-v2
Pm 02 track1-- 魏刚--osac-trusted-computing-pools-in-folsom-v2Pm 02 track1-- 魏刚--osac-trusted-computing-pools-in-folsom-v2
Pm 02 track1-- 魏刚--osac-trusted-computing-pools-in-folsom-v2
 
Case Study - Appirio as the Serverless Enterprise
Case Study - Appirio as the Serverless EnterpriseCase Study - Appirio as the Serverless Enterprise
Case Study - Appirio as the Serverless Enterprise
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1b
 
Geospatial Community Cloud Vision
Geospatial Community Cloud VisionGeospatial Community Cloud Vision
Geospatial Community Cloud Vision
 
Building tomorrow's web with today's tools
Building tomorrow's web with today's toolsBuilding tomorrow's web with today's tools
Building tomorrow's web with today's tools
 
First Operational Technology (OT) High Performance Messaging Patterns for Ent...
First Operational Technology (OT) High Performance Messaging Patterns for Ent...First Operational Technology (OT) High Performance Messaging Patterns for Ent...
First Operational Technology (OT) High Performance Messaging Patterns for Ent...
 
Complex End-to-End Testing
Complex End-to-End TestingComplex End-to-End Testing
Complex End-to-End Testing
 
Information Society with Absolute Trust in the Services
Information Society with Absolute Trust in the ServicesInformation Society with Absolute Trust in the Services
Information Society with Absolute Trust in the Services
 
IdM in Smart Applications on Virtual Infrastructure
IdM in Smart Applications on Virtual InfrastructureIdM in Smart Applications on Virtual Infrastructure
IdM in Smart Applications on Virtual Infrastructure
 
E-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netE-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the net
 
Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...
Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...
Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...
 
CensorNet ISP Filtering
CensorNet ISP FilteringCensorNet ISP Filtering
CensorNet ISP Filtering
 
IT Governance Portals
IT Governance   PortalsIT Governance   Portals
IT Governance Portals
 
Сравнение возможностей SPS 2010 по редакциям
Сравнение возможностей SPS 2010 по редакциямСравнение возможностей SPS 2010 по редакциям
Сравнение возможностей SPS 2010 по редакциям
 
The CORA Model Explained
The CORA Model ExplainedThe CORA Model Explained
The CORA Model Explained
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
 
Acl Presentation 3 4 10 Final
Acl Presentation 3 4 10 FinalAcl Presentation 3 4 10 Final
Acl Presentation 3 4 10 Final
 

More from Brian Culver

Real World SharePoint Framework and Azure Services
Real World SharePoint Framework and Azure ServicesReal World SharePoint Framework and Azure Services
Real World SharePoint Framework and Azure Services
Brian Culver
 
Real World SharePoint Framework and Azure Services
Real World SharePoint Framework and Azure ServicesReal World SharePoint Framework and Azure Services
Real World SharePoint Framework and Azure Services
Brian Culver
 
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Brian Culver
 
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Brian Culver
 
Share Upgrading and Migrating to SharePoint 2016 Like a Pro
Share Upgrading and Migrating to SharePoint 2016 Like a ProShare Upgrading and Migrating to SharePoint 2016 Like a Pro
Share Upgrading and Migrating to SharePoint 2016 Like a Pro
Brian Culver
 
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Brian Culver
 
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Brian Culver
 
Convert your Full Trust Solutions to the SharePoint Framework (SPFx) in 1 hour
Convert your Full Trust Solutions to the SharePoint Framework (SPFx) in 1 hourConvert your Full Trust Solutions to the SharePoint Framework (SPFx) in 1 hour
Convert your Full Trust Solutions to the SharePoint Framework (SPFx) in 1 hour
Brian Culver
 
Houston TechFest 2017- Migrate and Upgrade to 2016 Succesfully
Houston TechFest 2017- Migrate and Upgrade to 2016 SuccesfullyHouston TechFest 2017- Migrate and Upgrade to 2016 Succesfully
Houston TechFest 2017- Migrate and Upgrade to 2016 Succesfully
Brian Culver
 
Real World Add-in Development for Office365
Real World Add-in Development for Office365Real World Add-in Development for Office365
Real World Add-in Development for Office365
Brian Culver
 
Building SharePoint 2016 Hybrid the right way
Building SharePoint 2016 Hybrid the right wayBuilding SharePoint 2016 Hybrid the right way
Building SharePoint 2016 Hybrid the right way
Brian Culver
 
SPSHOU - Upgrading and Migrating to SharePoint 2016 like a Pro
SPSHOU - Upgrading and Migrating to SharePoint 2016 like a ProSPSHOU - Upgrading and Migrating to SharePoint 2016 like a Pro
SPSHOU - Upgrading and Migrating to SharePoint 2016 like a Pro
Brian Culver
 
HSPUG Loving one drive for business as a productivity tool
HSPUG Loving one drive for business as a productivity toolHSPUG Loving one drive for business as a productivity tool
HSPUG Loving one drive for business as a productivity tool
Brian Culver
 
SPT 104 Unlock your big data with analytics and BI on Office 365
SPT 104 Unlock your big data with analytics and BI on Office 365SPT 104 Unlock your big data with analytics and BI on Office 365
SPT 104 Unlock your big data with analytics and BI on Office 365
Brian Culver
 
Spt 101 Loving Onedrive for business as a productivity tool
Spt 101 Loving Onedrive for business as a productivity toolSpt 101 Loving Onedrive for business as a productivity tool
Spt 101 Loving Onedrive for business as a productivity tool
Brian Culver
 
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
Brian Culver
 
Loving OneDrive for Business as a Productivity Tool
Loving OneDrive for Business as a Productivity ToolLoving OneDrive for Business as a Productivity Tool
Loving OneDrive for Business as a Productivity Tool
Brian Culver
 
Unlock your Big Data with Analytics and BI on Office 365
Unlock your Big Data with Analytics and BI on Office 365Unlock your Big Data with Analytics and BI on Office 365
Unlock your Big Data with Analytics and BI on Office 365
Brian Culver
 
SharePoint 2013 Search Driven Sites - SPSHOU
SharePoint 2013 Search Driven Sites - SPSHOUSharePoint 2013 Search Driven Sites - SPSHOU
SharePoint 2013 Search Driven Sites - SPSHOU
Brian Culver
 
Unlock your Big Data with Analytics and BI on Office 365 - OFF103
Unlock your Big Data with Analytics and BI on Office 365 - OFF103Unlock your Big Data with Analytics and BI on Office 365 - OFF103
Unlock your Big Data with Analytics and BI on Office 365 - OFF103Brian Culver
 

More from Brian Culver (20)

Real World SharePoint Framework and Azure Services
Real World SharePoint Framework and Azure ServicesReal World SharePoint Framework and Azure Services
Real World SharePoint Framework and Azure Services
 
Real World SharePoint Framework and Azure Services
Real World SharePoint Framework and Azure ServicesReal World SharePoint Framework and Azure Services
Real World SharePoint Framework and Azure Services
 
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
 
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
 
Share Upgrading and Migrating to SharePoint 2016 Like a Pro
Share Upgrading and Migrating to SharePoint 2016 Like a ProShare Upgrading and Migrating to SharePoint 2016 Like a Pro
Share Upgrading and Migrating to SharePoint 2016 Like a Pro
 
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
How to convert your Full Trust Solutions to the SharePoint Framework (SPFx)
 
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
Convert your Full Trust Solutions to the SharePoint Framework (SPFx)
 
Convert your Full Trust Solutions to the SharePoint Framework (SPFx) in 1 hour
Convert your Full Trust Solutions to the SharePoint Framework (SPFx) in 1 hourConvert your Full Trust Solutions to the SharePoint Framework (SPFx) in 1 hour
Convert your Full Trust Solutions to the SharePoint Framework (SPFx) in 1 hour
 
Houston TechFest 2017- Migrate and Upgrade to 2016 Succesfully
Houston TechFest 2017- Migrate and Upgrade to 2016 SuccesfullyHouston TechFest 2017- Migrate and Upgrade to 2016 Succesfully
Houston TechFest 2017- Migrate and Upgrade to 2016 Succesfully
 
Real World Add-in Development for Office365
Real World Add-in Development for Office365Real World Add-in Development for Office365
Real World Add-in Development for Office365
 
Building SharePoint 2016 Hybrid the right way
Building SharePoint 2016 Hybrid the right wayBuilding SharePoint 2016 Hybrid the right way
Building SharePoint 2016 Hybrid the right way
 
SPSHOU - Upgrading and Migrating to SharePoint 2016 like a Pro
SPSHOU - Upgrading and Migrating to SharePoint 2016 like a ProSPSHOU - Upgrading and Migrating to SharePoint 2016 like a Pro
SPSHOU - Upgrading and Migrating to SharePoint 2016 like a Pro
 
HSPUG Loving one drive for business as a productivity tool
HSPUG Loving one drive for business as a productivity toolHSPUG Loving one drive for business as a productivity tool
HSPUG Loving one drive for business as a productivity tool
 
SPT 104 Unlock your big data with analytics and BI on Office 365
SPT 104 Unlock your big data with analytics and BI on Office 365SPT 104 Unlock your big data with analytics and BI on Office 365
SPT 104 Unlock your big data with analytics and BI on Office 365
 
Spt 101 Loving Onedrive for business as a productivity tool
Spt 101 Loving Onedrive for business as a productivity toolSpt 101 Loving Onedrive for business as a productivity tool
Spt 101 Loving Onedrive for business as a productivity tool
 
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
 
Loving OneDrive for Business as a Productivity Tool
Loving OneDrive for Business as a Productivity ToolLoving OneDrive for Business as a Productivity Tool
Loving OneDrive for Business as a Productivity Tool
 
Unlock your Big Data with Analytics and BI on Office 365
Unlock your Big Data with Analytics and BI on Office 365Unlock your Big Data with Analytics and BI on Office 365
Unlock your Big Data with Analytics and BI on Office 365
 
SharePoint 2013 Search Driven Sites - SPSHOU
SharePoint 2013 Search Driven Sites - SPSHOUSharePoint 2013 Search Driven Sites - SPSHOU
SharePoint 2013 Search Driven Sites - SPSHOU
 
Unlock your Big Data with Analytics and BI on Office 365 - OFF103
Unlock your Big Data with Analytics and BI on Office 365 - OFF103Unlock your Big Data with Analytics and BI on Office 365 - OFF103
Unlock your Big Data with Analytics and BI on Office 365 - OFF103
 

Recently uploaded

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

SharePoint Saturday Houston: SharePoint 2010 Extranets & Claims Authentication

  • 1.
  • 3. Thank you for being a part of the first ever SharePoint Saturday for the greater Houston area!
  • 4.
  • 5.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17. Claim-based Authentication Trust 3 SharePoint Au th e nt ic 4 at Identity Provider io Se n Security Token Service cu R eq rity (IP-STS) ue to st ken 5 Service token request Claims Providers 6 Security token response SharePoint ASP.net Client 1 R Active Directory eque STS Trust Membership st Reso 2 A urce uthe ntica te Requ est/R SharePoint e d i re LiveID SAML ct Authorization Based 7 Request Resource with service token
  • 18. Mixed Authentication Multi-Authentication SharePoint SharePoint Farm Farm Web Application Web Application Windows Windows Authentication Zone: Default Authentication Zone: Default Regular label-callout text FBA Authentication Extended Web Application Extended Web Application Zone: Extranet FBA Zone: Extranet SAML Based Authentication Authentication FBA Authentication Extended Web Application Extended Web Application Zone: Intranet ... Zone: Intranet Windows Authentication Extended Web Application Extended Web Application Zone: Internet ... Zone: Internet ... Extended Web Application Extended Web Application Zone: Custom ... Zone: Custom ...
  • 19. s
  • 20.
  • 21. s
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Please complete and turn in your Session Evaluation Form so we can improve future events. Presenter: Brian Culver Session Name: Extranets & Claims Authentication

Editor's Notes

  1. So today we are going to define an extranet and cover …
  2. Common implementation scenarios for ExtranetsRemote EmployeesTraveling sales force, Employees working from home offices or customer sites, Geographically dispersed virtual teamsLine of Business Applications, Collaboration, publishingWe have to start thinking about identification and permissions  Internal Identities such as ADPartnersJoint ventures, shared projects, short and long term scenariosIsolated data, shared resources, security and restrictionsExternal and Internal IdentitiesVendors & CustomersCustomer Collaboration, Announcements and Publishing PortalsTargeted and segmented contentExternal Identities
  3. Network topology access– Infrastructure and the number of access pointsIdentity Management  How to manage accounts? Types of users?Identity provider they live in.SSO – Log in one timeInfo Disclosure makes sure it is secure but data is properly isolated and not leaked.Antivirus to ensure secure data and content.The rich client experience Office integration, edit in Word and avoid multiple auth promptsLets look at three common network topologies …
  4. This configuration uses a reverse proxy server on the border between the Internet and the corporate network to intercept and then forward requests to the appropriate Web server located in the intranet. Using a set of configurable rules, the proxy server verifies that the requested URLs are allowed based on the zone from which the request originated. The requested URLs are then translated into internal URLs. AdvantagesSimplest solution that requires the least amount of hardware and configuration. Very economical.Entire server farm is located within the corporate network.Single point of data:Data is located within the trusted network.Data maintenance occurs in one place. Single farm used for both internal and external requests ensures that all authorized users view the same content.Internal user requests are not passed through a proxy server.DisadvantagesResults in a single firewall that separates the corporate internal network from the Internet.Corporate network is vulnerable if external users are compromised.
  5. A back-to-back perimeter topology isolates the server farm in a separate perimeter networkThis topology has the following characteristics:All hardware and data reside in the perimeter network.The server farm roles and network infrastructure servers can be separated across multiple layers. Combining the network layers can reduce the complexity and costEach layer can be separated by additional routers or firewalls to ensure that only requests from specific layers are allowed.Requests from the internal network can be directed through the internal-facing ISA server or routed through the public interface of the perimeter network.AdvantagesContent is isolated to a single farm on the Perimeter (extranet) Network, simplifying sharing and maintenance of content across the intranet and the extranet.External user access is isolated to the perimeter network.If the extranet is compromised, damage is potentially limited to the affected layer or to the perimeter network.By using a separate Active Directory infrastructure, external user accounts can be created without affecting the internal corporate directory.DisadvantagesRequires additional network infrastructure and configuration.Databases can be compromised in the perimeterWe manage the additional identity management store
  6. This topology splits the farm between the perimeter and corporate networks. The computers running Microsoft SQL Server database software are hosted inside the corporate network. Web servers are located in the perimeter network. The application server computers can be hosted in either the perimeter network or the corporate network. AdvantagesComputers running SQL Server are not hosted inside the perimeter network.Farm components both within the corporate network and the perimeter network can share the same databases.Content can be isolated to a single farm inside the corporate network, which simplifies sharing and maintaining content across the corporate network and the perimeter network.With a separate Active Directory infrastructure, external user accounts can be created without affecting the internal corporate directory.DisadvantagesComplexity of the solution is greatly increased.Intruders who compromise perimeter network resources might gain access to farm content stored in the corporate network by using the server farm accounts.Inter-farm communication is typically split across two domains.
  7. Authentication returns the security principal in the HttpContext.UserIIS AuthenticatesFBA requires authentication providers to implement the Membership Provider interfaceWebSSO requires authentication providers to implement the Membership Provider interface including an HTTPModule for the WebSSO ProviderMembership Provider:GetUser( string )GetUserNamebyEmailFindUsersbyEmailFindUsersbyNameRole manager: RoleExists, GetRolesForUser, GetAllRolesWebSSOHTTPModule: AuthenticateRequest Uses user auth cookie to set HttpContext.User with security principalEndRequest Used to catch the 401 responses from WSS, turns them into 302 redirect for auth to the WebSSO logon server.
  8. Classic – Windows Native (NTLM, Kerberos). SharePoint consumes the NT token into an SPUser.Claims – Windows (NTLM, Kerberos), FBA (LDAP, ASP.Net/SQL), SAML (ADFS, WSTrust, WSFederation)Support existing Identity infrastructureActive DirectoryLDAP, SQLFederation GatewaysWebSSO and Identity Management systems“Normalized” the authentication tokens.Enable automatic, secure identity delegationSupport “no-credential” connections to External web servicesConsistent API to develop SharePoint solutionsClaims authentication for Microsoft SharePoint Server 2010 is built on Windows Identity Foundation. Windows Identity Foundation Framework is a set of .NET Framework classes that are used to implement claims-based identity.
  9. An identity is a security principal such as Tom, a windows security token … much like a claimExcept The claim doesn’t contain the windows security token ID, instead it contains one or more attributes that “claim” the identify of TomThe issuer is a system that issues claim on an identity that we trust. Facebook (Texas) vs. Live ID (Lousiana) – Tom lives in which state?The security token is created in SAML (Security Access Markup Language) which is extensible to support any claim. Windows Security Token is not extensible. Issuing Authority – knows about the claim desired by the target application. (AD, ASP.NET, LiveID, etc.) STS – sees windows security token and converts it to a SAML tokenRelying party – system that believes the claim
  10. Client is using a web browser. The client makes a web request (HTTP GET)SharePoint responds with a 401 Unathenticated and 302 Url to authenticateThe Authentication request is submitted to, and processed by, the local STS or another SAML compliant Identity provider, such as LiveID.The identity provider validates the identity and returns the security token (NT Token/SAML Token)Does SharePoint trust the token? The SharePoint (relying party) STS finds the policy for the requesting Web application in the policy store and creates a token for the requesting user using identity assertion values in the attribute store. Token augmentation, we add additional claims. A valid security token (new SharePoint SAML token) is returned to the user and then submitted to the Web application. The Web Browser requests the SharePoint resource with the Shareoint security token. SAML token is converted into an SPUser.Note there are two different tokens: One from Identity Provider, another from SharePoint.
  11. Client is using a web browser. The client makes a web request (HTTP GET)SharePoint responds with a 401 Unathenticated and 302 Url to authenticateThe Authentication request is submitted to, and processed by, the local STS or another SAML compliant Identity provider, such as LiveID.The identity provider validates the identity and returns the security token (NT Token/SAML Token)Does SharePoint trust the token? The SharePoint (relying party) STS finds the policy for the requesting Web application in the policy store and creates a token for the requesting user using identity assertion values in the attribute store. Token augmentation, we add additional claims. A valid security token (new SharePoint SAML token) is returned to the user and then submitted to the Web application. The Web Browser requests the SharePoint resource with the Shareoint security token. SAML token is converted into an SPUser.Note there are two different tokens: One from Identity Provider, another from SharePoint.
  12. Client is using a web browser. The client makes a web request (HTTP GET)SharePoint responds with a 401 Unathenticated and 302 Url to authenticateThe Authentication request is submitted to, and processed by, the local STS or another SAML compliant Identity provider, such as LiveID.The identity provider validates the identity and returns the security token (NT Token/SAML Token)Does SharePoint trust the token? The SharePoint (relying party) STS finds the policy for the requesting Web application in the policy store and creates a token for the requesting user using identity assertion values in the attribute store. Token augmentation, we add additional claims. A valid security token (new SharePoint SAML token) is returned to the user and then submitted to the Web application. The Web Browser requests the SharePoint resource with the Shareoint security token. SAML token is converted into an SPUser.Note there are two different tokens: One from Identity Provider, another from SharePoint.
  13. Client is using a web browser. The client makes a web request (HTTP GET)SharePoint responds with a 401 Unathenticated and 302 Url to authenticateThe Authentication request is submitted to, and processed by, the local STS or another SAML compliant Identity provider, such as LiveID.The identity provider validates the identity and returns the security token (NT Token/SAML Token)Does SharePoint trust the token? The SharePoint (relying party) STS finds the policy for the requesting Web application in the policy store and creates a token for the requesting user using identity assertion values in the attribute store. Token augmentation, we add additional claims. A valid security token (new SharePoint SAML token) is returned to the user and then submitted to the Web application. The Web Browser requests the SharePoint resource with the Shareoint security token. SAML token is converted into an SPUser.Note there are two different tokens: One from Identity Provider, another from SharePoint.
  14. Mixed Mode Authentication – (MOSS 2007) Single SharePoint Web Application, extended IIS Applications with different Urls and authentication.Multi-Authentication - Single SharePoint Web Application with more than one authentication provider.
  15. Different scheme for different protocolsProtecting access from different channelsAnonymous web sites