Vittorio Bertocci

Scatter thoughts

Browse by Tags

Tagged Content List
  • Blog Post: Claims on the Client…

    …and fire in the sky ♫ Don’t you hate it when a technical blog devolves in what is for the most part a series of announcements? That’s kind of what happened to mine. The reality is that making the things which get announced here take an inordinate amount of time, and that every remaining moment (usually...
  • Blog Post: Good Claims, Bad Claims 1: an Example

    Ahh, claims. Aren’t they a thing of beauty? When you first discover them, you’d be tempted to use them for everything up to and including brewing coffee. Now that we finally have powerful tools at our disposal for actually developing claims-based systems, as opposed of just talking about it, it is time...
  • Blog Post: An example of trusted subsystem fail in meatspace

    Here I am, stuck in Sydney airport for various cascade delays but awarded with the Gift of Free WiFi. I am coming back from a awesome 2 weeks in Australia and Nw Zealand, where I met great customers & partners, enjoyed the company of amazing friends & colleagues and drew few chuckles (while hopefully...
  • Blog Post: Books: “Programming Windows Identity Foundation”, P&P claims guide & others

      Want to know why I spent one hour every day of my vacation practicing touch typing? Well, apart from the fact that it’s simply scandalous that after 20+ years spent on keyboards I still hunt & peck: in the next few months I’m going to need all the typing speed I can gather… I am signed up...
  • Blog Post: [VIDEO] Identity & Cloud Services

      As promised last week , here there’s the video of my other session at the Belgian TechDays . This session was part of the Architecture track, hence I took a mildly different, more abstract approach: I position Cloud computing as a trend (storytelling the famous parallel between last century’s...
  • Blog Post: What goes into claims

    2 weeks ago Donovan and I were at RSA, manning the Geneva booth: the interest about this technology is overwhelming, as well as the enthusiasm for the claims based approach. Now that there’s actually something to toy with, as opposed to hand-weave how beautiful a claims-flavoured world would be, I...
  • Blog Post: One does not simply walk into Mordor, or Home Realm Discovery for the Internet

    Interesting discussion going on on Chris’ blog about OpenID & usability. There are many aspects I’d like to discuss, but it’s 11:34pm and “tomorrow” I have a conference call at 7:00am (sometimes the fact that the Earth is round DOES suck: sorry, Cristoforo): hence I better pick carefully. Ah, did...
  • Blog Post: Fun With Federation 1: ASP.NET, Geneva Framework & FedUtil.exe

    I won’t make names, of course, but somebody in the Identirati community often insinuates that Vittorio is card-centric :-). Now, while I’ll admit that I do have a personal preference for the active case , I definitely refuse the notion that I’m just about cards: and just to make a point, I’ll write few...
  • Blog Post: A visual tour of the .NET Access Control service, part 2: fun with scopes and issuers

    Here we are again. I am just back from Belgium’s TechDays , and I can still savor the nice feeling you get from talking in front of a very interested audience :-) I’m really glad to see that both the cloud and claims based identity are enjoying the attention they deserve! I have been asked to share the...
  • Blog Post: Roles? Those are claiiiiiims!

    [Warning: if you are not an identity geek, don't read] People tend to approach new things by understanding how they relate with what they already know. That's natural, and that's also a very effective strategy: however it can only get you so far, and if you don't start thinking out of the box/venture...
  • Blog Post: On-premises, hosting & cloud: a metaphor for understanding how they differ

    [Dear loyal readers, be warned: this post will contain some identity, but it is more about "pure" architecture & cloud services] On a flight Honolulu-Seattle; vacation is over, and I'm back to sharing with you my wild thoughts (ok, not ALL of my wild thoughts :-)). Have you noticed how people...
  • Blog Post: Interview about identity & cloud on IDPeople magazine

      Few weeks ago the good guys at the IDPeople magazine interviewed me on the topic of identity & cloud computing: you can access the text online or the pdf here (requires free registration). During IDWorld they also recorded a brief video about my session on the same theme , but I don't know...
  • Blog Post: An Identity Provider and its STS: writing a custom STS with the October Beta of the Geneva Framework

    [Disclaimer(): base() { this blog is NOT the source of the official guidance on the Geneva products. Please always check out the Geneva team blog for hearing directly from the product group} ] In the former installment I blabbered a bit about how an STS is a serious matter, and I can almost visualize...
  • Blog Post: An Identity Provider and its STS: preliminary considerations

    [Disclaimer(): base() { this blog is NOT the source of the official guidance on the Geneva products. Please always check out the Geneva team blog for hearing directly from the product group} ] Few weeks ago I had the pleasure of presenting, together with Planky, a TechEd EMEA interactive session on...
  • Blog Post: Delegation, or traversing multilayer architectures

    On a flight from Sydney to S.Francisco. We were supposed to leave at 1:55pm, we took off almost at 9:00pm. I am really, really pissed off and the only thing that lightens up my mood is re-reading the great comments that the Australian TechEd attendees left on as feedback for the couple of sessions I...
  • Blog Post: New Issue of the Architecture Journal: Article on "Claims and Identity, On-Premise and Cloud Solutions"

    The latest issue of the Architecture Journal is available for download here (I am breaking the news even before the rest of the pages are updated from issue 15 to issue 16: see how much I care about you?;-)). What makes this especially interesting is that issue 16 is entirely dedicated to identity...
  • Blog Post: Issuing smartcard backed managed cards... using Zermatt

    We are back! I hope you had fun with the STS tutorial I posted yesterday night ; here we move a step further and examine how to equip our STS with managed card issuance logic & UI. As anticipated, this is going to be MUCH faster. If you recall, in the last post I asked you not to delete the Default...
  • Blog Post: Setting up a quick & dirty STS which supports smartcard backed managed cards... using Zermatt

    Just back from vacation. The tan barely started to fade, and here I am already playing with the new shiny toy :-). Did you experiment with Zermatt by now? As Kim mentions the samples (and the documentation) are an excellent way to start, and I am sure that blog posts & tutorials will soon start mushrooming...
  • Blog Post: Announcing the Beta release of “Zermatt” Developer Identity Framework

    Ahh, I’ve been looking forward for this post for a looong time. We just made available for download the bits of the Beta of “Zermatt” Developer Identity Framework . “ Zermatt ” is the codename of a .NET framework that helps developers build claims-aware applications to address challenging application...
  • Blog Post: How often should you ask for a token?

    On the Seattle-Paris flight. I've just posted the piece about validation-authentication-authorization , and i am a bit bothered by the fact that I was unable to delve into greater details for what concerns the authoriZation part. In particular, I'd like to address one of the misunderstandings which can...
  • Blog Post: Validation, Authentication, Authorization: mangling tokens for your dark purposes

    Flying back from S.Diego, after attending a great edition of Catalyst. I should probably write down my impressions before they fade, like it happened with the IIW, but there's in fact something (only mildly related) that bugged me for quite some time and I just want to flush it out of my system before...
  • Blog Post: Active, Passive and Passive-Aggressive

    Ahh, terminology: joy and sorrow of our kind. There are some expressions that are very catchy and we use all the time, but that do not always serve well the purpose of communicating our thoughts. Take the usage of "passive" in the context of identity management; we tend to use it every time a web browser...
  • Blog Post: All your tokens are belong to us?

    Kim just posted a great piece about "an account this week describing an attack on the use of CardSpace within Internet Explorer". I won't add anything, because his post is just perfect as it is: I strongly suggest you go read it in its entirety . Here a quote: "Students at Ruhr Universitat Bochum in...
  • Blog Post: The fedlet as an R-STS

    I am horribly behind schedule with my blog, I still have to post a wrapup of IIW but didn't find the time so far; however I want to quickly comment on the recent coverage of the Fedlet (see Pat himself here and Paul here ). I attended the nice IIW session during which Pat demonstrated the fedlet. I found...
  • Blog Post: Claims propagation: Kirchhoff or maxflow?

    In the last week or so Paul Madsen made at least a couple of posts with strong visual components: one that resumed my old 2005 post on a notation for message crypto, the other on Feynman diagrams . Nice! Paul, when I am in that mood I find especially pleasant to thumb through Tufte : I highly recommend...
Page 1 of 8 (188 items) 12345»