SlideShare a Scribd company logo
1 of 14
Windows Identity Framework An overview of digital identity and single sign on.
Agenda ,[object Object]
Claims
Security Token Service (STS)
Active Directory Federation Services (ADFS 2.0)
Claims Aware Application
Windows Identity Foundation (WIF)
Passive Federation (Intranet Scenario)
Partner Federation
Demo,[object Object]
The amount of identities users must relate to (roles, groups)
Increasing cost around administration and maintenance of user stores
Lack of control over user identities, both by user himself and the organizations
When someone quits, how many identities in how many systems must be deactivated ?

More Related Content

What's hot

Review of Microsoft HealthVault
Review of Microsoft HealthVaultReview of Microsoft HealthVault
Review of Microsoft HealthVaultguest2c899db
 
MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...
MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...
MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...Nur Fatihah Mat Ali
 
Design Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On AccessDesign Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On AccessMike Reams
 
Custom contact facet
Custom contact facetCustom contact facet
Custom contact facetnisheesh
 
Universal login
Universal loginUniversal login
Universal loginZx MYS
 
Two factor authentication using login flows
Two factor authentication using login flows Two factor authentication using login flows
Two factor authentication using login flows CEPTES Software Inc
 
Duo MFA integration with CoinJar Bitcoin Wallet
Duo MFA integration with CoinJar Bitcoin WalletDuo MFA integration with CoinJar Bitcoin Wallet
Duo MFA integration with CoinJar Bitcoin WalletAmir Yunas
 
Export Data from Student Information System
Export Data from Student Information SystemExport Data from Student Information System
Export Data from Student Information SystemDiscovery Software
 
Case Study Design Pattern - Object Adapter
Case Study Design Pattern - Object AdapterCase Study Design Pattern - Object Adapter
Case Study Design Pattern - Object AdapterAdrian Seungjin Lee
 
Authentication Using Twitter, Google, Facebook, And More
Authentication Using Twitter, Google, Facebook, And MoreAuthentication Using Twitter, Google, Facebook, And More
Authentication Using Twitter, Google, Facebook, And MoreBilly Cravens
 
Early Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceEarly Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceOliver Pfaff
 
Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10githe26200
 
Openid - an identity system for the open Web
Openid - an identity system for the open WebOpenid - an identity system for the open Web
Openid - an identity system for the open WebEduserv Foundation
 
Lynn Fy07 Q4 Msdn Events Copy
Lynn Fy07 Q4 Msdn Events   CopyLynn Fy07 Q4 Msdn Events   Copy
Lynn Fy07 Q4 Msdn Events Copyllangit
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Journals
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Publishing House
 
Building blocks of android
Building blocks of androidBuilding blocks of android
Building blocks of androidSiddhesh Palkar
 

What's hot (20)

Review of Microsoft HealthVault
Review of Microsoft HealthVaultReview of Microsoft HealthVault
Review of Microsoft HealthVault
 
MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...
MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...
MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...
 
Design Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On AccessDesign Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On Access
 
Custom contact facet
Custom contact facetCustom contact facet
Custom contact facet
 
Wif and sl4 (en)
Wif and sl4 (en)Wif and sl4 (en)
Wif and sl4 (en)
 
Universal login
Universal loginUniversal login
Universal login
 
Two factor authentication using login flows
Two factor authentication using login flows Two factor authentication using login flows
Two factor authentication using login flows
 
Duo MFA integration with CoinJar Bitcoin Wallet
Duo MFA integration with CoinJar Bitcoin WalletDuo MFA integration with CoinJar Bitcoin Wallet
Duo MFA integration with CoinJar Bitcoin Wallet
 
Export Data from Student Information System
Export Data from Student Information SystemExport Data from Student Information System
Export Data from Student Information System
 
816isdfo
816isdfo816isdfo
816isdfo
 
Case Study Design Pattern - Object Adapter
Case Study Design Pattern - Object AdapterCase Study Design Pattern - Object Adapter
Case Study Design Pattern - Object Adapter
 
Authentication Using Twitter, Google, Facebook, And More
Authentication Using Twitter, Google, Facebook, And MoreAuthentication Using Twitter, Google, Facebook, And More
Authentication Using Twitter, Google, Facebook, And More
 
Early Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceEarly Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpace
 
Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10
 
Openid - an identity system for the open Web
Openid - an identity system for the open WebOpenid - an identity system for the open Web
Openid - an identity system for the open Web
 
Lynn Fy07 Q4 Msdn Events Copy
Lynn Fy07 Q4 Msdn Events   CopyLynn Fy07 Q4 Msdn Events   Copy
Lynn Fy07 Q4 Msdn Events Copy
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Building blocks of android
Building blocks of androidBuilding blocks of android
Building blocks of android
 

Viewers also liked

Honors thesis overview: Katie Amberg-Johnson
Honors thesis overview: Katie Amberg-JohnsonHonors thesis overview: Katie Amberg-Johnson
Honors thesis overview: Katie Amberg-JohnsonPhilip Johnson
 
Liberating Identity using Windows Identity Foundation
Liberating Identity using Windows Identity FoundationLiberating Identity using Windows Identity Foundation
Liberating Identity using Windows Identity FoundationSimon Evans
 
Introduction to persistency and Berkeley DB
Introduction to persistency and Berkeley DBIntroduction to persistency and Berkeley DB
Introduction to persistency and Berkeley DBPhilip Johnson
 
Introduction to ICS 691: Software Engineering for the Smart Grid
Introduction to ICS 691: Software Engineering for the Smart GridIntroduction to ICS 691: Software Engineering for the Smart Grid
Introduction to ICS 691: Software Engineering for the Smart GridPhilip Johnson
 
How to plan a Kukui Cup
How to plan a Kukui CupHow to plan a Kukui Cup
How to plan a Kukui CupPhilip Johnson
 
Kukui Cup 2012 Organizing Committee February Meeting
Kukui Cup 2012 Organizing Committee February MeetingKukui Cup 2012 Organizing Committee February Meeting
Kukui Cup 2012 Organizing Committee February MeetingPhilip Johnson
 
Kukui Cup 2012 Energy Data
Kukui Cup 2012 Energy DataKukui Cup 2012 Energy Data
Kukui Cup 2012 Energy DataPhilip Johnson
 

Viewers also liked (7)

Honors thesis overview: Katie Amberg-Johnson
Honors thesis overview: Katie Amberg-JohnsonHonors thesis overview: Katie Amberg-Johnson
Honors thesis overview: Katie Amberg-Johnson
 
Liberating Identity using Windows Identity Foundation
Liberating Identity using Windows Identity FoundationLiberating Identity using Windows Identity Foundation
Liberating Identity using Windows Identity Foundation
 
Introduction to persistency and Berkeley DB
Introduction to persistency and Berkeley DBIntroduction to persistency and Berkeley DB
Introduction to persistency and Berkeley DB
 
Introduction to ICS 691: Software Engineering for the Smart Grid
Introduction to ICS 691: Software Engineering for the Smart GridIntroduction to ICS 691: Software Engineering for the Smart Grid
Introduction to ICS 691: Software Engineering for the Smart Grid
 
How to plan a Kukui Cup
How to plan a Kukui CupHow to plan a Kukui Cup
How to plan a Kukui Cup
 
Kukui Cup 2012 Organizing Committee February Meeting
Kukui Cup 2012 Organizing Committee February MeetingKukui Cup 2012 Organizing Committee February Meeting
Kukui Cup 2012 Organizing Committee February Meeting
 
Kukui Cup 2012 Energy Data
Kukui Cup 2012 Energy DataKukui Cup 2012 Energy Data
Kukui Cup 2012 Energy Data
 

Similar to Windows Identity Foundation

CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricSpiffy
 
OWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptOWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptwebhostingguy
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...Brian Culver
 
Developing and deploying Identity-enabled applications for the cloud
Developing and deploying Identity-enabled applications for the cloudDeveloping and deploying Identity-enabled applications for the cloud
Developing and deploying Identity-enabled applications for the cloudMaarten Balliauw
 
Windows identityfoundationwhitepaperfordevelopers rtw
Windows identityfoundationwhitepaperfordevelopers rtwWindows identityfoundationwhitepaperfordevelopers rtw
Windows identityfoundationwhitepaperfordevelopers rtwPradeep Krishnamurthy
 
Understanding Claim based Authentication
Understanding Claim based AuthenticationUnderstanding Claim based Authentication
Understanding Claim based AuthenticationMohammad Yousri
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7EAE
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityOliver Pfaff
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...ijcnes
 
e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)Sabino Labarile
 
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Amazon Web Services
 
Azure Active Directory by Nikolay Mozgovoy
Azure Active Directory by Nikolay MozgovoyAzure Active Directory by Nikolay Mozgovoy
Azure Active Directory by Nikolay MozgovoySigma Software
 
Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016Issac Goldstand
 

Similar to Windows Identity Foundation (20)

CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
 
OWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptOWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.ppt
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
 
Developing and deploying Identity-enabled applications for the cloud
Developing and deploying Identity-enabled applications for the cloudDeveloping and deploying Identity-enabled applications for the cloud
Developing and deploying Identity-enabled applications for the cloud
 
Windows identityfoundationwhitepaperfordevelopers rtw
Windows identityfoundationwhitepaperfordevelopers rtwWindows identityfoundationwhitepaperfordevelopers rtw
Windows identityfoundationwhitepaperfordevelopers rtw
 
Understanding Claim based Authentication
Understanding Claim based AuthenticationUnderstanding Claim based Authentication
Understanding Claim based Authentication
 
Federated and fabulous identity
Federated and fabulous identityFederated and fabulous identity
Federated and fabulous identity
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
 
App V
App VApp V
App V
 
Day6
Day6Day6
Day6
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
 
ASP.NET 13 - Security
ASP.NET 13 - SecurityASP.NET 13 - Security
ASP.NET 13 - Security
 
e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)
 
SWXG 2010.6.9 v2
SWXG 2010.6.9 v2SWXG 2010.6.9 v2
SWXG 2010.6.9 v2
 
A26001006
A26001006A26001006
A26001006
 
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
 
Web-services
Web-services Web-services
Web-services
 
Azure Active Directory by Nikolay Mozgovoy
Azure Active Directory by Nikolay MozgovoyAzure Active Directory by Nikolay Mozgovoy
Azure Active Directory by Nikolay Mozgovoy
 
Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016
 

Windows Identity Foundation