SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
UNDERSTANDING
CLAIMS AUTHENTICATION
INTRODUCTION
This presentation will give you short and not very technical
overview about claims-based authentication.
The claims-based authentication will be the way to almost
all Microsoft web-based platforms around. It is more
complex than old username-password method but also
more secure and general.
REMEMBER THE HISTORY
We were depending on AD, SQL Tables.
Text fields, ASP.NET Membership Provider.
Traditional Authentication
Traditional Authentication
Traditional Authentication
CLAIMS TO THE RESCUE
Reuse across applications: Centralized Standards Conformant
Centralize “Who Am I” logic, allow applications to focus on What can I
do” Consuming applications never know your password
Allows for B2B Collaboration w/o AD trust
Allows for B2C Collaboration without managing user identities
The cloud demands it
What are claims?
Claim is piece of information that describes given identity on some
aspect. Take claim as name-value pair. Claims are held in authentication
token that may have also signature so you can be sure that token is
not tampered on its way from remote machine to your system. You can
think of token as envelop that contains claims about user.
• Token may contain different claims:
• username or user ID in remote system,
• full name of user,
• e-mail address,
• membership in security groups,
• phone number,
• color of eyes.
EXAMPLES
Security Token Signed XML document containing claims
SAML Standard token language, popular in enterprise, self
contained spec 1.1 and 2.0
OAuth Another claims standard, more popular on consumer applications
Open ID
JWT (JSON web Token) Open ID method of exchanging tokens
WS* WS-Trust, WS-Federation, WS-Security Policy
Claims-based authentication
Claims-based authentication is more
general authentication mechanism that
allows users to authenticate on external
systems that provide asking system with
claims about user.
The Claims-based authentication
flow
• User makes request to some
application.
• System redirects user to
authentication page of external
system (it may also happen after
system lets user to select external
system where he or she wants to
log in).
• After successful authentication
external system redirects user back
with some information.
• Application makes request to
external system to validate user.
• If user is valid then user gets access
to application.
Claims-based authentication in
practice
Claims-based authentication can be found from many
applications:
• Microsoft SharePoint 2010 and 2013,
• Windows Azure Access Control Services (ACS),
• Active Directory Federation Services (ADFS),
• Applications using Windows Identity Foundation
(WIF)
What is an IP-STS and what is a RP-
STS?
There are two kinds of STS: an Identity Provider STS (IP-STS) and a Relying Party
STS(RP-STS).
• An IP-STS authenticates a client using, for example, Windows integrated
authentication. It creates a SAML token based on the claims provided by the
client, and might add its own claims. A Relying Party application (RP) receives the
SAML token and uses the claims inside to decide whether to grant the client
access to the requested resource.
• An RP-STS does not authenticate the client, but relies on a SAML token provided
by an IP-STS that is trusts. Typically, an IP-STS is found in the client’s domain,
whereas an RP-STS is found in the RP’s domain. This is shown the following
diagram.
What is an IP-STS and what is a RP-
STS?
NOTE #1
The STS is super important, because it offers the
addressable endpoint through which I can interact
with the IP via the negotiation & encapsulation
protocol, it is from where I can get the certificate
that asserts the IP identity in a cryptographically
strong way; but the identity provider is more than
that, it is the set of identities it knows about, its
reputation, its capability of issuing cards (which are
NOT tokens, even if they are signed)
NOTE #2
• Sometimes the RP will accept only tokens from a special kind of STS,
the authorization STS,
A relying party (RP) is a computer term used to
refer to a server providing access to a secure
software application.
WHAT IS RP?
What is RP
• Claims-based applications, where a claim is a statement an
entity makes about itself in order to establish access, are also
called relying party (RP) applications. RPs can also be called
“claims aware applications” and “claims-based applications”, and
web applications and services can both be RPs.
• With a Security Token Service (STS), the RP is redirected to an
STS, which authenticates the RP and issues a security token
granting access, instead of the application authenticating the RP
directly. The claims are extracted from the tokens and used for
identity related tasks.
LET’S MAKE IT COMPLICATED
what it you need to establish multiple identity sources within one application?
• Configure your application to allow anonymous users to select their
authentication source (SharePoint does this method)
• Allow for a "Hub" approach where a core IP-STS is also a RP-STS with
additional trusted claims provides (ADFS and ACS do this)
Understanding Claim based Authentication

Contenu connexe

Tendances

Proxy servers
Proxy serversProxy servers
Proxy servers
Kumar
 

Tendances (20)

Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
Building secure applications with keycloak
Building secure applications with keycloak Building secure applications with keycloak
Building secure applications with keycloak
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
Authentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.Net
 
OAuth2 + API Security
OAuth2 + API SecurityOAuth2 + API Security
OAuth2 + API Security
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Interfaces .net
Interfaces .netInterfaces .net
Interfaces .net
 
Introduction to OpenID Connect
Introduction to OpenID Connect Introduction to OpenID Connect
Introduction to OpenID Connect
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
A Java Microservices Spring Boot and Docker case study.
A Java Microservices Spring Boot and Docker case study.A Java Microservices Spring Boot and Docker case study.
A Java Microservices Spring Boot and Docker case study.
 
OpenID Connect: An Overview
OpenID Connect: An OverviewOpenID Connect: An Overview
OpenID Connect: An Overview
 
API Security Best Practices and Guidelines
API Security Best Practices and GuidelinesAPI Security Best Practices and Guidelines
API Security Best Practices and Guidelines
 
LDAP
LDAPLDAP
LDAP
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
 
Object oriented programming With C#
Object oriented programming With C#Object oriented programming With C#
Object oriented programming With C#
 
Iterator Design Pattern
Iterator Design PatternIterator Design Pattern
Iterator Design Pattern
 
OAuth
OAuthOAuth
OAuth
 
Wi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyWi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and Privacy
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 
Angularjs PPT
Angularjs PPTAngularjs PPT
Angularjs PPT
 

En vedette

Claims Based Authentication A Beginners Guide
Claims Based Authentication A Beginners GuideClaims Based Authentication A Beginners Guide
Claims Based Authentication A Beginners Guide
Phuong Nguyen
 

En vedette (8)

Claims Based Authentication A Beginners Guide
Claims Based Authentication A Beginners GuideClaims Based Authentication A Beginners Guide
Claims Based Authentication A Beginners Guide
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
 
Hacking Journalism: Using the Internet to Save the World
Hacking Journalism: Using the Internet to Save the WorldHacking Journalism: Using the Internet to Save the World
Hacking Journalism: Using the Internet to Save the World
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Hack ASP.NET website
Hack ASP.NET websiteHack ASP.NET website
Hack ASP.NET website
 
The what, why, and how of master data management
The what, why, and how of master data managementThe what, why, and how of master data management
The what, why, and how of master data management
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data Management
 
Migrating Existing Applications to AWS Cloud
Migrating Existing Applications to AWS CloudMigrating Existing Applications to AWS Cloud
Migrating Existing Applications to AWS Cloud
 

Similaire à Understanding Claim based Authentication

Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
Raj Chanchal
 
DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010
Spencer Harbar
 

Similaire à Understanding Claim based Authentication (20)

e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Authentication through Claims-Based Authentication
Authentication through Claims-Based AuthenticationAuthentication through Claims-Based Authentication
Authentication through Claims-Based Authentication
 
Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
 
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudSharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
 
Presentation
PresentationPresentation
Presentation
 
OAuth2 primer
OAuth2 primerOAuth2 primer
OAuth2 primer
 
GHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestGHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail Quest
 
OAuth 2
OAuth 2OAuth 2
OAuth 2
 
.NET Core, ASP.NET Core Course, Session 19
 .NET Core, ASP.NET Core Course, Session 19 .NET Core, ASP.NET Core Course, Session 19
.NET Core, ASP.NET Core Course, Session 19
 
76 s201923
76 s20192376 s201923
76 s201923
 
Iam f42 a
Iam f42 aIam f42 a
Iam f42 a
 
DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010
 
Access management
Access managementAccess management
Access management
 
Restful api
Restful apiRestful api
Restful api
 
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
 
ASP.NET 13 - Security
ASP.NET 13 - SecurityASP.NET 13 - Security
ASP.NET 13 - Security
 

Dernier

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Dernier (20)

%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 

Understanding Claim based Authentication

  • 2. INTRODUCTION This presentation will give you short and not very technical overview about claims-based authentication. The claims-based authentication will be the way to almost all Microsoft web-based platforms around. It is more complex than old username-password method but also more secure and general.
  • 3. REMEMBER THE HISTORY We were depending on AD, SQL Tables. Text fields, ASP.NET Membership Provider.
  • 7. CLAIMS TO THE RESCUE Reuse across applications: Centralized Standards Conformant Centralize “Who Am I” logic, allow applications to focus on What can I do” Consuming applications never know your password Allows for B2B Collaboration w/o AD trust Allows for B2C Collaboration without managing user identities The cloud demands it
  • 8. What are claims? Claim is piece of information that describes given identity on some aspect. Take claim as name-value pair. Claims are held in authentication token that may have also signature so you can be sure that token is not tampered on its way from remote machine to your system. You can think of token as envelop that contains claims about user. • Token may contain different claims: • username or user ID in remote system, • full name of user, • e-mail address, • membership in security groups, • phone number, • color of eyes.
  • 9. EXAMPLES Security Token Signed XML document containing claims SAML Standard token language, popular in enterprise, self contained spec 1.1 and 2.0 OAuth Another claims standard, more popular on consumer applications Open ID JWT (JSON web Token) Open ID method of exchanging tokens WS* WS-Trust, WS-Federation, WS-Security Policy
  • 10. Claims-based authentication Claims-based authentication is more general authentication mechanism that allows users to authenticate on external systems that provide asking system with claims about user.
  • 11. The Claims-based authentication flow • User makes request to some application. • System redirects user to authentication page of external system (it may also happen after system lets user to select external system where he or she wants to log in). • After successful authentication external system redirects user back with some information. • Application makes request to external system to validate user. • If user is valid then user gets access to application.
  • 12. Claims-based authentication in practice Claims-based authentication can be found from many applications: • Microsoft SharePoint 2010 and 2013, • Windows Azure Access Control Services (ACS), • Active Directory Federation Services (ADFS), • Applications using Windows Identity Foundation (WIF)
  • 13. What is an IP-STS and what is a RP- STS? There are two kinds of STS: an Identity Provider STS (IP-STS) and a Relying Party STS(RP-STS). • An IP-STS authenticates a client using, for example, Windows integrated authentication. It creates a SAML token based on the claims provided by the client, and might add its own claims. A Relying Party application (RP) receives the SAML token and uses the claims inside to decide whether to grant the client access to the requested resource. • An RP-STS does not authenticate the client, but relies on a SAML token provided by an IP-STS that is trusts. Typically, an IP-STS is found in the client’s domain, whereas an RP-STS is found in the RP’s domain. This is shown the following diagram.
  • 14. What is an IP-STS and what is a RP- STS?
  • 15. NOTE #1 The STS is super important, because it offers the addressable endpoint through which I can interact with the IP via the negotiation & encapsulation protocol, it is from where I can get the certificate that asserts the IP identity in a cryptographically strong way; but the identity provider is more than that, it is the set of identities it knows about, its reputation, its capability of issuing cards (which are NOT tokens, even if they are signed)
  • 16. NOTE #2 • Sometimes the RP will accept only tokens from a special kind of STS, the authorization STS,
  • 17. A relying party (RP) is a computer term used to refer to a server providing access to a secure software application. WHAT IS RP?
  • 18. What is RP • Claims-based applications, where a claim is a statement an entity makes about itself in order to establish access, are also called relying party (RP) applications. RPs can also be called “claims aware applications” and “claims-based applications”, and web applications and services can both be RPs. • With a Security Token Service (STS), the RP is redirected to an STS, which authenticates the RP and issues a security token granting access, instead of the application authenticating the RP directly. The claims are extracted from the tokens and used for identity related tasks.
  • 19. LET’S MAKE IT COMPLICATED what it you need to establish multiple identity sources within one application? • Configure your application to allow anonymous users to select their authentication source (SharePoint does this method) • Allow for a "Hub" approach where a core IP-STS is also a RP-STS with additional trusted claims provides (ADFS and ACS do this)