2 Applications, Workflows, … Service Registry Federated Identity and Access Control Your Service s Application Messaging Patterns Connectivity Fabric Clients On-Premises Desktop, Web, Desktop, RIA, Web Desktop, RIA, Web RIAs, ESB Corp Service Cloud Services Storage Billing Compute …

Download Report

Transcript 2 Applications, Workflows, … Service Registry Federated Identity and Access Control Your Service s Application Messaging Patterns Connectivity Fabric Clients On-Premises Desktop, Web, Desktop, RIA, Web Desktop, RIA, Web RIAs, ESB Corp Service Cloud Services Storage Billing Compute …

1 2 3 3

Federated Identity and Access Control Applications, Workflows, … Service Registry Application Messaging Patterns Connectivity Fabric Your Service s Clients Web, RIA, Web RIA, Web RIAs, On-Premises ESB Corp Service Cloud Services Storage Billing Compute …

1. Define access control rules 6. Check for claims 0. Trust exchanged; secrets, certs Your Access Control Project 3. Map input claims to output claims based on access control rules Your App (Relying Party) 5. Send token w/ request User (Application)

http://www.azure.com

Your feedback is important!

© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.

The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.