Pluralsight - Windows Identity Foundation Patterns: On-Premise and Cloud
English | WMV | 1024x768 | VC-1 35.6 Kbps 15.000 fps | WMA 128 Kbps 44.1 khz | 2 channels | 563 MB

Dealing with multiple identities has always been challenging; even more so with the advent of the cloud. Developers and architects are often confused by the numerous terms, acronyms and buzzwords - such as Active/Passive Federation, SWT, SAML, ADFS, WIF, WS-Trust, WS-Federation, OAuth, OAuth WRAP and others.

This course starts by distilling the technology jargon; setting the foundation for understanding various identity solutions. Having laid the foundation, this course then focuses on typical claims-based identity solution patterns within enterprises. Understanding these recurring implementation themes will further simply the mapping of claims-based identity to your LOB applications.

Course Overview 01:03:27

Introduction 00:30

Course Objectives 02:21

Challenges with Multiple Identities 04:43

Claims-based Authentication 02:55

Protocols and Token Formats 06:00

Windows Identity Foundation 05:50

Identity Providers and Active Directory Federation Services 04:12

ADFS Lab Setup using Windows Azure Virtual Machine 12:21

Access Control Service - Federation Provider 07:26

ACS Portal Walkthrough 05:42

ADFS vs ACS 02:20

Windows Azure Active Directory 03:05

Course Patterns 05:03

Summary 00:59

Protect REST Resource - Authentication and Delegation 00:45:45

Introduction 01:09

Intent and Motivation 01:15

Motivation Example 01:14

Solution 02:15

Implementation 03:19

Creating WCF REST Service 05:19

Securing REST Service 03:23

Register REST Service as Relying Party with ACS 08:03

Add Client Project and Service Identity 04:42

Authentication with SWT Token 03:45

Moving from Authentication to Delegation 01:41

Establishing Delegation Trust via Service Identities 06:10

Delegation in Action 02:15

Consequences 00:40

Summary 00:35

Federate with multiple Identity Providers 00:56:27

Introduction 01:07

Intent and Motivation 01:00

Motivating Example 01:27

Solution 02:22

Implementation: Direct ADFS - Enterprise SSO 01:52

Setting up Relying Party with SSL 01:19

Adding ADFS as Identity Provider 01:46

Adding Relying Party to ADFS 03:08

Authentication using ADFS 00:49

Implementation: WS-Federation with Web Clients (ASP.NET WebForms, MVC) 01:23

Establishing Trust Between ADFS and ACS 08:28

Establishing Trust Between ACS and Relying Party 08:36

WS-Federation in Action 02:53

Implementation: WS-Federation with Rich Clients 01:56

Creating XAML Client 02:42

Retrieve IdentityProviders using JavaScriptNotify Protocol 09:14

Handling Notify Event via InteropServices 04:48

Consequences 00:43

Summary 00:54

Token and Claims Transformation 01:03:19

Introduction 00:48

Intent and Motivation 01:04

Motivation Example 00:48

Solution 00:53

Implementation: Token Transformation 03:10

SAML to SWT Token Conversion with ACS 09:22

Extending the ASP.NET WIF pipeline 04:24

ASP.NET in action with SWT 01:31

Implementation: Working with Rich Clients 01:28

Simulate WSTrustBinding for WIF 4.5 05:59

WSTrustChannelFactory with ADFS EndPoint 03:52

SAML to SWT Conversion using ACS OAuth WRAP EndPoint 05:12

Implementation: Claims Transformation 02:03

Claims Transformation and Augmentation 10:02

Chaining ACS Rules 06:41

ACS Intersection Rules 04:16

Consequences 00:58

Summary 00:48

Security Token Management and Cloud Scalability 00:54:35

Introduction 01:10

Intent And Motivation 01:24

Motivating Example 01:41

Solution 01:30

Implementation with VS.NET 2010 01:45

Establish trust between ACS and VS2010 Relying Party 06:54

Configure Cloud Service Project 02:27

Managing Multiple STS References - OnPremise and Cloud 05:20

Publish To Azure 05:36

Implementation: Securing Session Tokens 00:57

Certificate Managment and FedAuth Cookie Transforms 04:24

Adding Certificate to Azure Instances 02:14

Scaling on Azure 03:08

Implementation: Distributed Token Cache 02:07

Adding Azure Caching Preview Worker Role 04:28

Creating Distributed Token Cache 04:23

Final Run 03:07

Consequences 00:59

Summary 01:01

Further Reading and References 00:02:03

Further Reading and References 02:03

Only the registered members can see the download links/content. pleaseĀ Register to gain full access.