Alik Levin's

Clarity, Technology, and Solving Problems | PracticeThis.com

Windows Identity Foundation (WIF) Explained – Web Browser Sign-In Flow (WS-Federation Passive Requestor Profile)

Windows Identity Foundation (WIF) Explained – Web Browser Sign-In Flow (WS-Federation Passive Requestor Profile)

  • Comments 0

In his book Programming Windows Identity Foundation (Dev - Pro)  Vittorio provides good explanation of how sign-in flow performed in the case of claims aware application. It is based on WS-Federation Sign-In Sequence and called WS-Federation Passive Requestor Profile. The summary of steps are:

  • User requests a page from the site (RP – Relying Party).
  • User gets redirected to STS (Security Token Service) website for authentication (HTTP 302 with Location header containing STS’ URL). Query string parameters attached:
    • wa (action, such as wsign1.0 or wsignout1.0)
    • wtrealm (target realm, the original application’s URL)
    • wct – optional time stamp when the request was issued. Useful to counter spoofing and replay attacks.
  • STS performs authentication of its choice (Basic, Digest, Windows, Client Certificates, Custom) independently of WS-Federation protocol.
  • STS renders back HTML form with the following form parameters in it:
    • Target has the value of wtrealm, so it can be submitted to original site.
    • wa parameter has the original value.
    • wresult – either security token[s] in case of successful authentication or a fault otherwise.
  • The browser submits the POST request of the form to the original web site (RP – Relying Party).
  • If the original web site (RP – Relying Party) created using ASP.NET (do not have to) then WIF (WSFederationAuthenticationModule, FAM) takes care of validating the request and the tokens, the developers needs to do nothing here. If validation succeeds authentication session cookie with the token is issued and the request being redirected to self once more.
  • On subsequent requests the cookie (FedAuth[N]) that has the token parsed by SessionAuthenticationModule including parsing the claims and populating ClaimsPrincipal and ClaimsIdentity into the HttpContext.User.

Good explanation for the process and visuals of the sequence including Fiddler captures of the HTTP trafic provided in Claims-Based Architectures from A Guide to Claims–based Identity and Access Control. For deep dive consider reading Michele Leroux Bustamante’s Passive Authentication for ASP.NET with WIF.

Your Choices for WS-Federation Passive Requestor Profile STS

Following are your choices for available STS you can use in your applications:

More Info

Related Books