SIM402 Kerberos, NTLM, Basic, Digest, Forms? Federation of Identity Issuer IP-STS Identity Provider (IP) Security Token Service (STS) User / Subject /Principal The Security Token Contains claims.
Download ReportTranscript SIM402 Kerberos, NTLM, Basic, Digest, Forms? Federation of Identity Issuer IP-STS Identity Provider (IP) Security Token Service (STS) User / Subject /Principal The Security Token Contains claims.
SIM402 Kerberos, NTLM, Basic, Digest, Forms? Federation of Identity Issuer IP-STS Identity Provider (IP) Security Token Service (STS) User / Subject /Principal The Security Token Contains claims about the user For example: • Name • Group membership • User Principal Name (UPN) • Email address of user • Email address of manager • Phone number • Other attribute values Signed by issuer Requests token for AppX ST Active Directory Issues Security Token crafted for Appx Security Token “Authenticates” user to the application AppX Relying party (RP)/ Resource provider Trusts the Security Token from the issuer Claims-aware app Our user ADFS STS Active Directory App trusts STS Browse app Not authenticated Redirected to STS Authenticate Return Security Token Send Token Return cookies and page Query for user attributes Your ADFS STS Your Claims-aware app Partner user App trusts STS Browse app Partner ADFS STS & IP Active Directory Your STS trusts your partner’s STS Not authenticated Redirect to your STS Home realm discovery Redirected to partner STS requesting ST for partner user Authenticate Return ST for consumption by your STS Redirected to your STS Return new ST Send Token Return cookies and page Process token Relying party Root for B Issuer A Public key of C D B Communication Signing ST Encryption ST Root for A C Public key of D Claims-aware application Active Directory ADFS 2.0 Define AD as claims provider Define STS1 as claims provider APP1 STS1 Define APP1 as Relying party AD Specify incoming claims that will be accepted from the claims provider and passed to the pipeline Permit: specifies claims that will be sent to the relying party Deny: Not processed C l a i m s P i p e l i n e Specify the users that are permitted to access the relying party ST Condition Issuance Statement Partner organization Your organization Partner ADFS STS & IP Your ADFS STS Claims Trust Claims Trust Relying Party Trust Relying Party x Your Organization ADFS Security Token Service (STS) Partner user ST ST from Partner Claims Trust Trusted Partner Client request token for access to relying party x ST Returns token for Relying Party x ST Processes Acceptance Transform Rules Processes Issuance Authorization Rules If allowed processes Issuance Rules Relying Party x If denied Processing ends Your ADFS STS Your Claims-aware app Partner user Partner ADFS STS & IP Browse app Not authenticated Redirect to your STS Home realm discovery Redirected to partner STS requesting ST for partner user Authenticate Return ST for consumption by your STS ST Redirected to your STS Return new ST ST Send Token Return page and cookie Process token ST ST Active Directory John has designed and implemented computing systems ranging from high-speed industrial controllers through to distributed IT systems with a focus on security and high-availability. A key player in many IT projects for industry leaders including Microsoft, the UK Government and multi-nationals that require optimized IT systems. Developed technical training courses that have been published worldwide, co-authored a highly successful book on Microsoft Active Directory Internals, presents regularly at major international conferences including, TechEd, IT Forum and European summits. John can be engaged as a consultant or booked for speaking engagements through XTSeminars. www.xtseminars.co.uk Blue Section http://www.microsoft.com/cloud/ http://www.microsoft.com/privatecloud/ http://www.microsoft.com/windowsserver/ http://www.microsoft.com/windowsazure/ http://www.microsoft.com/systemcenter/ http://www.microsoft.com/forefront/ http://northamerica.msteched.com www.microsoft.com/teched www.microsoft.com/learning http://microsoft.com/technet http://microsoft.com/msdn