Eugenio Pace

Preparing to be wrong

Browse by Tags

Tagged Content List
  • Blog Post: Claims Identity Guide–Hands On Labs

    Training content based on our guides has been as popular as the content itself. You can now download the “Release Candidate” for labs corresponding to the new guide . The labs are more than just a mirror of the guide. We took the opportunity of adding a few things that complement and extend what is explained...
  • Blog Post: Intuit Data Services + Windows Azure + Identity

    This week, we completed a small PoC for brabant court , a customer that is building a Windows Azure application that integrates with Intuit’s Data Services (IDS). A couple words on mabbled from brabant court. Mabbled is a Windows Azure app (ASP.NET MVC 3, EF Code First, SQL Azure, AppFabric ACS|Caching...
  • Blog Post: Authentication in WP7 client with REST Services–Part II

    In the previous post I covered the “semi-passive” way for authentication between a Windows Phone 7 client and a REST service. This post completes the information with the “active” way. There’s nothing unexpected here really: We call the Identity Provider using a RequestSecurityToken message (RST) We...
  • Blog Post: Authentication in WP7 client with REST Services–Part I

    In the last drop, we included a sample that demonstrates how to secure a REST web service with ACS, and a client calling that service running in a different security realm: In this case, ACS is the bridge between the WS-Trust/SAML world (Litware in the diagram) and the REST/SWT side (Adatum’s a-Order...
  • Blog Post: Drop #2 of Claims Identity Guide on CodePlex

    Second drop of samples and draft chapters is now available on CodePlex. Highlights: All 3 samples for ACS v2: (" ACS as a Federation Provider ", " ACS as a FP with Multiple Business Partners " and " ACS and REST endpoints "). These samples extend all the original "Federation...
  • Blog Post: SaaSGrid and Identity

    Apprenda’s SaaSGrid is now “claims enabled”!  This is fantastic news. Any SG customer can now enjoy the benefits of claims based identity: simpler user management, easy federation with business partners, support for multiple identity providers, greater interoperability, etc. SG support for claims...
  • Blog Post: Web Single Sign Out–Part II

      Following up on previous post , there were 2 questions: Where do these green checks images come from? There are nowhere in a-Order or in a-Expense… you would spend hours looking for the PNG, or JPG or GIF and you will never find it, because it is very well concealed. Can you guess where it comes...
  • Blog Post: Single Sign Out–WebSSO

    While reviewing all the existing samples we’ve noticed that our implementation of Single Sign Out was kind of….weak.  It wasn’t really fully implemented and wasn’t very clear what was happening either (or what it should happen) We’ve fixed all that now in scenario 1: WebSSO . Things get more complicated...
  • Blog Post: ACS as a Federation Provider – Claims transformation

    To work properly, a-Order needs a number of claims to be supplied: User name Organization Role The "Organization” claim is used to filter orders belonging to a specific customer of Adatum. For example, Litware users (like Rick) will eventually end up with a token containing a claim with “Organization...
  • Blog Post: ACS as a Federation Provider–Home Realm Discovery Part 2

    In my previous post, I had a question for all you: What would happen if Adatum’s FP didn’t supply ACS with the whr parameter? An the answer is: ….. ACS will simply ask the user!   ACS has no way (besides the whr parameter) of knowing where to go next (unless you configured your app with only 1 Identity...
  • Blog Post: ACS as a Federation Provider - A little bit deeper into the sample (Home Realm Discovery)

    Updates : fixed typos. Clarified how Home Realm Discovery works in this example.   In the previous post , I introduced the basic scenario of using ACS as a federation provider for Adatum (in addition to the one they already have). In this post, I’ll show you more details on how this works, based...
  • Blog Post: Our next project – Claims based Identity and Access Control

    Not surprisingly maybe, security in general, and authentication & authorization in particular, is a consistently highly rated concern for our customers. These concerns are especially elevated  with those considering the cloud, because they don’t have as much control on the cloud as they would...
  • Blog Post: Claims Identity Guide samples updated

    I’ve just uploaded to CodePlex updated samples for the Claims based Identity Guide . This have all been adapted to work on Visual Studio 2010, .NET 4.0 and MVC 2.0. See here for downloading the bits. From the release notes:                                   ...
  • Blog Post: Identity Federation Interoperability – WIF + ADFS + CA SiteMinder

      Update: I just found this comprehensive guide for setting up federation with CA SiteMinder. http://technet.microsoft.com/en-us/library/ff754295(WS.10).aspx How it works (Full size diagram here ) End to end demo (Video here ) Technorati Tags: Federated Identity , SSO , Federation Provider , Identity...
  • Blog Post: Identity Federation Interoperability – WIF + ADFS + IBM Tivoli Federated Identity Manager

      How it works (Full size diagram here ) End to end demo (Video here ) Technorati Tags: ADFS , WIF , Geneva , Identity Federation , Identity Provider , STS , SSO
  • Blog Post: Identity Federation Interoperability – WIF + ADFS + Sun’s OpenSSO

    As I announced some time ago, we’ve been working on a few labs that demonstrate interoperability with 3rd party identity components. More specifically: CA SiteMinder 12.0 IBM Tivoli Federated Identity Manager 6.2 Sun OpenSSO 8.0 The general architecture of the lab follows what is described in chapter...
  • Blog Post: Windows Azure Architecture Guide – Part 2 – TailSpin Surveys – AuthN and AuthZ

    Tailspin Surveys is a multitenant, SaaS solution, targeting many different customers. Some of these customers might be “enterprise” with “Big-IT” and are likely to demand advanced integration capabilities for identity (e.g. identity federation). Others, potentially smaller, are likely to not require...
  • Blog Post: Have you used our Claims Identity Guide?

    We want to know about your success! Share your story with us and get a signed book and a few little surprises from patterns & practices.   Just send me a short e-mail ( eugeniop AT microsoft.com ) with the following information: e-mail subject: “My Claims Guide Story”. Who you are. A short paragraph...
  • Blog Post: WIF and MVC – How it works

    I got a few questions from people on how the “ Federation with Multiple Partners ” sample of the guide works, so I figured I would just write it down in one place for eternity. The guide explains all sequence in quite some detail (see pages 88 to 97), but sometimes a diagram is more helpful, so here...
  • Blog Post: Federated Identity interoperability samples

    Customers frequently ask me about interoperability with their non-Microsoft products, and identity is not an exception. There’s roughly 2 set of scenarios that come up often: A relying party (an application) built on the Microsoft stack trusting a non-Microsoft Identity Provider. A non-Microsoft application...
  • Blog Post: Windows Azure Guidance – First version of a-Expense in the cloud

    Available for download here , you’ll find the first step in taking a-Expense to Windows Azure. Highlights of this release are: Use of SQL Azure as the backend store for application entities (e.g. expense reports) Uses Azure storage for user profile information (the “Reimbursement method” user preference...
  • Blog Post: Windows Azure Guidance – a-Expense “before” on CodePlex

    First build of our samples is now available on CodePlex . This initial version is the “before the cloud” baseline application, so you won’t find anything related to Windows Azure here. This week we will take this simple baseline and start moving it to the cloud. Goals for this next iteration are to:...
  • Blog Post: A Guide to Claims based Identity – Released - The strategy behind it and our plans

    As most of you know, the Guide for Claims based Identity is officially released. We’ve been “technically done” for a couple months, but it just takes some time for all content to be pushed to MSDN, an ISBN to approved, the final PDF to be ready for publishing and the process with the printer to be started...
  • Blog Post: Just Released – Claims-Identity Guide online

    The entire book is now available for browsing online on MSDN here: http://msdn.microsoft.com/en-us/library/ff359115%28lightweight%29.aspx Now, to be honest, it doesn’t look as nice as the printed book (small preview here):     But everything is in there! (and doesn’t look that bad at all either...
  • Blog Post: Updated code samples & chapters for Claims Identity Guide – Release Candidate

    In synch with the availability of ADFS V2.0 Release Candidate , I’m very happy to announce that we are posting a new update of the guide. Our own “RC”. You’ll find new samples and new chapters. Both content complete now. We are now covering the following scenarios: Single Sign on for web applications...
Page 1 of 2 (42 items) 12