SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Binh Thanh Nguyen
Solutions Architect and Project Manager
Bamboo Solutions Corporation Vietnam
• Identity and Identity Providers
• Authentication and Authorization
• Identity challenges in SharePoint 2007
• Claims-Based Identity
• Claims-Based Authentication in
  Microsoft SharePoint 2010
• Demo
• Q&A
• What is Identity?
  – A set of attributes to describe a user
• What is Identity Providers?
  – Composed of attributes/identifiers
• Examples:
  – Active Directory, Directory Services
• What is Authentication (AuthN)?
  – Authentication is the process of
    identification and validation of a
    user's identity
• What is Authorization (AuthZ)?
  – Determines whether that identity
    has access to a particular resource
    such as sites, content, and other
    features the user can access.
• Authentication is intertwined within
  SharePoint 2007
• Very Complex in doing the
  configuration
• Access control only through
  attribute providers

So… What is the SOLUTIONS ???
• What is Claims?    Issuer: Police
                     Dept.
                                      Issuer: VN
                                      Railway
  – Information      Full Name        Name

    about the user   ID Number        Frequent flyer
                                      number
    … such as Full   Address          Train number

    name, e-mail,    Regional         Bus

    age, group,      Date of birth    Seat number

    etc.
                     Date of issue    Date of issue
                     Sex

                     Picture
Request ID Card


        ID Card
                  Trust




      ID Card

       Ticket


      Ticket
• The service component that builds, signs,
  and issues security tokens.
• Supports multiple credential types
• Identity Provider STS (IP-STS) and a Relying
  Party STS(RP-STS).
   – An IP-STS is an STS that issues tokens that
     can be used to request service tokens
     from RP-STSs.
   – An RP-STS can also consume other types of
     tokens (or credentials), for example an NT
     token that comes from the domain
     controller or the (KDC)
• STSs can be chained
• SharePoint STS is always relying party STS
  Built on Windows Identity Foundation
  (WIF)
• Multiple authentication types
• Identity Provider neutral
   – Configured via Central Admin or
     PowerShell
• Delegation of user identity between
  applications.
Send Cookie
 Send token
 Issue token
Send token
Issue token
 Authenticate
Browser                         Issuer
           Get /                         Active Directory

           302
                    AuthN

                   SAML Token

    Post
                        Process Token
          Cookie

      Cookie

           302          Process Claims
-Classic   -Claims
• Support existing identity infrastructure
   – Active Directory
   – LDAP, SQL
   – WebSSO and Identity Management Systems
• Multiple authentication methods per
  SharePoint Web Application
• Enable automatic, secure identity delegation
   – Cross-machines & cross-farm
• Support “no-credential” connections to
  External web services
• Standards-based and Interoperable
Configure claims-based authentication
       using Windows Live ID
• MSDN and Technet:
  – http://technet.microsoft.com/en-
    us/library/ff973117.aspx#section3
  – http://blogs.technet.com/b/ritaylor/archive/20
    09/06/03/claims-based-authentication-an-
    overview.aspx
  – http://technet.microsoft.com/en-
    us/sharepoint/ff678022.aspx#lesson2
  – http://blogs.msdn.com/b/russmax/archive/201
    0/05/27/understanding-sharepoint-2010-
    claims-authentication.aspx
• Microsoft PDC:
  – http://www.microsoftpdc.com/2009/SVC26
THANK YOU!

Contenu connexe

Similaire à Claims based authentication in SharePoint 2010 - SharePoint Saturday Vietnam

Claim Based Authentication in SharePoint 2010 for Community Day 2011
Claim Based Authentication in SharePoint 2010 for Community Day 2011Claim Based Authentication in SharePoint 2010 for Community Day 2011
Claim Based Authentication in SharePoint 2010 for Community Day 2011
Joris Poelmans
 
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
Liam Cleary [MVP]
 
Claims Based Authentication in SharePoint 2010
Claims Based Authentication in SharePoint 2010Claims Based Authentication in SharePoint 2010
Claims Based Authentication in SharePoint 2010
Jonathan Schultz
 
NIC 2014 Modern Authentication for the Cloud Era
NIC 2014 Modern Authentication for the Cloud EraNIC 2014 Modern Authentication for the Cloud Era
NIC 2014 Modern Authentication for the Cloud Era
Morgan Simonsen
 
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudSharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
Danny Jessee
 
Early Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceEarly Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpace
Oliver Pfaff
 

Similaire à Claims based authentication in SharePoint 2010 - SharePoint Saturday Vietnam (20)

Claim Based Authentication in SharePoint 2010 for Community Day 2011
Claim Based Authentication in SharePoint 2010 for Community Day 2011Claim Based Authentication in SharePoint 2010 for Community Day 2011
Claim Based Authentication in SharePoint 2010 for Community Day 2011
 
SharePoint, ADFS and Claims Auth
SharePoint, ADFS and Claims AuthSharePoint, ADFS and Claims Auth
SharePoint, ADFS and Claims Auth
 
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
 
SPSBE 2013 Claims for devs
SPSBE 2013 Claims for devsSPSBE 2013 Claims for devs
SPSBE 2013 Claims for devs
 
SharePoint Saturday Utah - Do you claim to be from the Azure Sky?
SharePoint Saturday Utah - Do you claim to be from the Azure Sky?SharePoint Saturday Utah - Do you claim to be from the Azure Sky?
SharePoint Saturday Utah - Do you claim to be from the Azure Sky?
 
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
 
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
 
Federated and fabulous identity
Federated and fabulous identityFederated and fabulous identity
Federated and fabulous identity
 
Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...
 
SharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorizationSharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorization
 
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudSharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
 
Claims Based Authentication in SharePoint 2010
Claims Based Authentication in SharePoint 2010Claims Based Authentication in SharePoint 2010
Claims Based Authentication in SharePoint 2010
 
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudSharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
 
NIC 2014 Modern Authentication for the Cloud Era
NIC 2014 Modern Authentication for the Cloud EraNIC 2014 Modern Authentication for the Cloud Era
NIC 2014 Modern Authentication for the Cloud Era
 
Presentation
PresentationPresentation
Presentation
 
The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)
 
Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010
 
Claims-Based Identity, Facebook, and the Cloud
Claims-Based Identity, Facebook, and the CloudClaims-Based Identity, Facebook, and the Cloud
Claims-Based Identity, Facebook, and the Cloud
 
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudSharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
 
Early Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceEarly Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpace
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Claims based authentication in SharePoint 2010 - SharePoint Saturday Vietnam

  • 1.
  • 2. Binh Thanh Nguyen Solutions Architect and Project Manager Bamboo Solutions Corporation Vietnam
  • 3. • Identity and Identity Providers • Authentication and Authorization • Identity challenges in SharePoint 2007 • Claims-Based Identity • Claims-Based Authentication in Microsoft SharePoint 2010 • Demo • Q&A
  • 4.
  • 5. • What is Identity? – A set of attributes to describe a user
  • 6. • What is Identity Providers? – Composed of attributes/identifiers • Examples: – Active Directory, Directory Services
  • 7.
  • 8. • What is Authentication (AuthN)? – Authentication is the process of identification and validation of a user's identity • What is Authorization (AuthZ)? – Determines whether that identity has access to a particular resource such as sites, content, and other features the user can access.
  • 9.
  • 10. • Authentication is intertwined within SharePoint 2007 • Very Complex in doing the configuration • Access control only through attribute providers So… What is the SOLUTIONS ???
  • 11.
  • 12. • What is Claims? Issuer: Police Dept. Issuer: VN Railway – Information Full Name Name about the user ID Number Frequent flyer number … such as Full Address Train number name, e-mail, Regional Bus age, group, Date of birth Seat number etc. Date of issue Date of issue Sex Picture
  • 13. Request ID Card ID Card Trust ID Card Ticket Ticket
  • 14.
  • 15. • The service component that builds, signs, and issues security tokens. • Supports multiple credential types • Identity Provider STS (IP-STS) and a Relying Party STS(RP-STS). – An IP-STS is an STS that issues tokens that can be used to request service tokens from RP-STSs. – An RP-STS can also consume other types of tokens (or credentials), for example an NT token that comes from the domain controller or the (KDC) • STSs can be chained
  • 16. • SharePoint STS is always relying party STS Built on Windows Identity Foundation (WIF) • Multiple authentication types • Identity Provider neutral – Configured via Central Admin or PowerShell • Delegation of user identity between applications.
  • 17. Send Cookie Send token Issue token Send token Issue token Authenticate
  • 18. Browser Issuer Get / Active Directory 302 AuthN SAML Token Post Process Token Cookie Cookie 302 Process Claims
  • 19. -Classic -Claims
  • 20.
  • 21. • Support existing identity infrastructure – Active Directory – LDAP, SQL – WebSSO and Identity Management Systems • Multiple authentication methods per SharePoint Web Application • Enable automatic, secure identity delegation – Cross-machines & cross-farm • Support “no-credential” connections to External web services • Standards-based and Interoperable
  • 22. Configure claims-based authentication using Windows Live ID
  • 23.
  • 24. • MSDN and Technet: – http://technet.microsoft.com/en- us/library/ff973117.aspx#section3 – http://blogs.technet.com/b/ritaylor/archive/20 09/06/03/claims-based-authentication-an- overview.aspx – http://technet.microsoft.com/en- us/sharepoint/ff678022.aspx#lesson2 – http://blogs.msdn.com/b/russmax/archive/201 0/05/27/understanding-sharepoint-2010- claims-authentication.aspx • Microsoft PDC: – http://www.microsoftpdc.com/2009/SVC26