Check it out! 

Published: September 27, 2011

This white paper describes how Web applications in Microsoft SharePoint Server 2010 can use claims-based authentication to provide authenticated access to entities that are external to your organization and enable multiple authentication types within a single zone.

It also provides many of the details related to setting up a trust configuration, an explanation of runtime considerations and management, configuration details, and programmatic implementations or use of the extensibility points that turn federated access into a federated SharePoint Server 2010 business solution. In addition, this white paper provides guidance in the following areas:

  •           Overview of Claims-based Identity in SharePoint Server 2010
  •           SharePoint Server 2010 with Active Directory Federation Services 2.0
  •           Creating Multiple Claims Authentication Web Applications in a Single SharePoint Server 2010 Farm
  •           Setting the Login Token Expiration Correctly for SharePoint Server 2010 SAML Claims Users
  •           Creating a Custom Claims Provider
  •           Migration of Users in Classic Mode to Trusted Provider Claims
  •           How to Enable Tracing for SharePoint Server 2010 Claims
  •           Trusted Identity Providers and User Profile Synchronization
  •           Using Audiences with Claims-Based Sites
  •           Implications of Claims Mode Authentication on Service Applications
  •           Service Applications and the C2WTS
  •           Using Active Authentication for Custom Development in SharePoint Server 2010 Claims Authentication Web Applications

Download the white paper

 

 ( Please forgive the typos.  Anywhere ADFS was in the paper was find-replaced with AD FS broke the code examples and powershell.  I am working to get that revised currently.  Also special thanks to a couple of the authors/contributers who are missing from the credits -  Adam Conkle and Tyler Durham. )