SlideShare a Scribd company logo
AD FS 2 & Claims-Based IdentityLaura E. HunterIdentity Lady, AD FS Zealotlaura.hunter@lhaconsulting.comhttp://www.shutuplaura.com@adfskitteh
The Problem? We Lack a Consistent Identity Layer for Applications
The Result?Hard-coded dependencies, “Continuous Wheel Re-Invention”Resistance to Change
LDAP://dc1.bigfirm.com/ou=FTEs,dc=bigfirm,dc=com
filter = ((&(objectClass=user)(|(sn=*smith*)(displayName=*smith*)(givenName=*smith*)(cn=*smith*))))
How many different ways can you authenticate to an app?
Managing Application Identity – First Principles1.  Identify the Caller2.  Extract Information for AuthZ & Personalization
Windows Integrated AuthenticationDoes Active Directory work everywhere?
Adfs 2 & claims based identity
Adfs 2 & claims based identity
What’s the Solution?
So What’s a Claim?“I am a member of the Marketing group”“My email address is …”“I am over 21 years of age”Populated using information fromAD/ADAM/ADLDSSQLExpressed using the SAML format
<saml:AssertionAssertionID="..." IssueInstant="2006-07-11T03:15:40Z" Issuer=“https://adatum-dc1.adatum.com“><saml:ConditionsNotBefore="2006-07-11T03:15:40Z" NotOnOrAfter="2006-07-11T04:15:40Z"><saml:Audience> https://contoso-dc1.contoso.com </saml:Audience><saml:AuthenticationStatementAuthenticationInstant="2006-07-11T03:15:40Z" AuthenticationMethod="urn:federation:authentication:windows"><saml:NameIdentifierFormat="http://schemas.xmlsoap.org/claims/UPN">adamcar@adatum.com</saml:NameIdentifier><saml:AttributeAttributeName="Group”<saml:AttributeValue> Administrators</saml:AttributeValue><Signaturexmlns="http://www.w3.org/2000/09/xmldsig#"> ab315cdff14d</Signature></saml:Assertion>Abridged SAML Token(Don’t Squint, Just Get the Big Idea!)
AD FS is all about the apps!
Standards-based:WS-FederationWS-TrustSAML 2.0Use cases:WebSSOWeb Services (WCF)What is this…“claims-aware” application of which you speak?
What Can I do with this?
Application Access in a Single Org
Account Partner(ADATUM)Resource Partner(CONTOSO)A. DatumAccount ForestTrey ResearchResource ForestFederation TrustFederated Application Access
SSO to Service Providers
Cloudy with a Chance of Federation
So what does it look like?
WS-Fed Passive ProfileAccount Partner(Users)Resource Partner(Resource)A. DatumAccount ForestTrey ResearchResource ForestFederation Trust
Something lost, something gained…What about passwords?What about deprovisioning?
Liberty Alliance Results…ADFS 2 SAML 2.0 Interop Testing with Entrust, IBM, Novell, Ping, SAP, SiemensIdP LiteSP LiteEGov 1.5Matrix testing results:http://www.projectliberty.org/liberty/liberty_interoperable/implementations/saml_2_0_test_procedure_v3_2_2_full_matrix_implementation_table_q309/
Adfs 2 & claims based identity
If you remember nothing else but this…
I want the integrity of yourusers’ identity information when they access myresources…
…to be at least as good…
as the integrity of yourusers’ identity information when they access yourresources.
AD FS components are Windows componentsNo additional server software costs…but it’s all about the apps!AD FSv2 (was “Geneva”)Release Candidate Available NowRTM…“Soon”Windows Identity Foundation.NET Developer PlatformFree DownloadAvailable now!AD FS 2.0 Availability, Pricing
AD Cookbook, 3rd  EditionBest selling Active Directory titleWhat’s New?Windows Server 2008 coverage: Read Only Domain Controllers (RODCs)Fine Grained Password Policies (FGPPs)Exchange 2007 integration & scriptingIdentity Lifecycle Manager 2007Windows PowerShell & Active Directory .NET programmingNew user interface features Always more than one way!Learn More! http://oreilly.com/catalog/9780596521103/
Thank You!mailto: laura.hunter@lhaconsulting.comblog: http://www.shutuplaura.comtwitter: @adfskitteh

More Related Content

PDF
Understanding 'Authentication' and 'Identity Federation'
PDF
International Journal of Engineering Inventions (IJEI)
PDF
Claim based authentaication
PPTX
Asp.net membership anduserroles_ppt
PDF
Difference between authentication and authorization in asp.net
PDF
Deciphering 'Claims-based Identity'
PDF
Integrate Business Apps with Facebook, Twitter, and LinkedIn
DOC
Android application fundamentals
Understanding 'Authentication' and 'Identity Federation'
International Journal of Engineering Inventions (IJEI)
Claim based authentaication
Asp.net membership anduserroles_ppt
Difference between authentication and authorization in asp.net
Deciphering 'Claims-based Identity'
Integrate Business Apps with Facebook, Twitter, and LinkedIn
Android application fundamentals

Viewers also liked (20)

PPTX
ADFS + IAM
PPTX
Office 365-single-sign-on-with-adfs
PPTX
Understanding Identity Management with Office 365
PPTX
Identity Management for Office 365 and Microsoft Azure
KEY
PowerShell and the Future of Windows Automation
PPT
PowerShell crashcourse
PPT
PowerShell Functions
PPT
No-script PowerShell v2
PPTX
Ive got a powershell secret
PPT
Free tools for win server administration
PDF
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
PPTX
Basic PowerShell Toolmaking - Spiceworld 2016 session
PPT
Ad disasters & how to prevent them
PPTX
Best free tools for w d a
PPTX
PowerShell crash course
PPTX
PowerShell custom properties
PPTX
Managing enterprise with PowerShell remoting
PPTX
PowerShell and WMI
PPTX
PowerShell crashcourse for Sharepoint admins
PPTX
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
ADFS + IAM
Office 365-single-sign-on-with-adfs
Understanding Identity Management with Office 365
Identity Management for Office 365 and Microsoft Azure
PowerShell and the Future of Windows Automation
PowerShell crashcourse
PowerShell Functions
No-script PowerShell v2
Ive got a powershell secret
Free tools for win server administration
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Basic PowerShell Toolmaking - Spiceworld 2016 session
Ad disasters & how to prevent them
Best free tools for w d a
PowerShell crash course
PowerShell custom properties
Managing enterprise with PowerShell remoting
PowerShell and WMI
PowerShell crashcourse for Sharepoint admins
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
Ad

Similar to Adfs 2 & claims based identity (20)

PDF
Bsides Tampa Blue Team’s tool dump.
PPT
Identity Federation on JBossAS
PPTX
Secure Modern Workplace With Microsoft 365 Threat Protection
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PPTX
IdP, SAML, OAuth
PDF
How to protect your corporate from advanced attacks
PPTX
Splunk for Security Breakout Session
PPTX
Understanding Application Threat Modelling & Architecture
PPTX
PeopleSoft: HACK THE Planet^W university
PPTX
SplunkLive! - Splunk for Security
PPTX
Application Security Architecture and Threat Modelling
PPT
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
PPTX
Detection of webshells in compromised perimeter assets using ML algorithms
PDF
How to 2FA-enable Open Source Applications
PPTX
Role-Based Access Control
PDF
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
PPT
Basics of IT security
PDF
Stuxnet redux. malware attribution & lessons learned
PPTX
Hands-On Security - Disrupting the Kill Chain
PPT
BSidesDC 2016 Beyond Automated Testing
Bsides Tampa Blue Team’s tool dump.
Identity Federation on JBossAS
Secure Modern Workplace With Microsoft 365 Threat Protection
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
IdP, SAML, OAuth
How to protect your corporate from advanced attacks
Splunk for Security Breakout Session
Understanding Application Threat Modelling & Architecture
PeopleSoft: HACK THE Planet^W university
SplunkLive! - Splunk for Security
Application Security Architecture and Threat Modelling
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Detection of webshells in compromised perimeter assets using ML algorithms
How to 2FA-enable Open Source Applications
Role-Based Access Control
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
Basics of IT security
Stuxnet redux. malware attribution & lessons learned
Hands-On Security - Disrupting the Kill Chain
BSidesDC 2016 Beyond Automated Testing
Ad

More from Nathan Winters (20)

PPTX
Exch2010 compliance ngm f inal
PPTX
Exchange 2010 storage improvements
PPTX
Ultan kinahan dr - minasi 2010
PPTX
Sql server troubleshooting
PPTX
Aidan finn vmm 2008 r2 - minasi forum 2010
PPT
The new rocket science stuff in microsoft pki
PPT
Today's malware aint what you think
PPTX
Nathan Winters Exchange 2010 protection and compliance
PPTX
Migrating to Exchange 2010 and ad 2080 r2
PPTX
Desktop virtualization scott calvet
PPTX
Nathan Winters TechDays UK Exchange 2010 IPC
PPTX
OCS Introduction for Learning Gateway Conference 2009
PPTX
Introduction to Exchange 2010
PPTX
Eric Rux The Big One Merging 2 Companies
PPT
Ultan Kinahan Business Continuity & Dr With Virtualization And Doubletake
PPT
Thomas Deimel The World Of Hackintosh
PPTX
Joe Mc Glynn Sbs 2008 For The Small Business
PPTX
Rhonda Layfield Sniffing Your Network With Netmon 3.3
PPTX
Roger Grimes How I Fixed The Internets
PPTX
Nathan Winters What’s New And Cool In Ocs 2007 R2
Exch2010 compliance ngm f inal
Exchange 2010 storage improvements
Ultan kinahan dr - minasi 2010
Sql server troubleshooting
Aidan finn vmm 2008 r2 - minasi forum 2010
The new rocket science stuff in microsoft pki
Today's malware aint what you think
Nathan Winters Exchange 2010 protection and compliance
Migrating to Exchange 2010 and ad 2080 r2
Desktop virtualization scott calvet
Nathan Winters TechDays UK Exchange 2010 IPC
OCS Introduction for Learning Gateway Conference 2009
Introduction to Exchange 2010
Eric Rux The Big One Merging 2 Companies
Ultan Kinahan Business Continuity & Dr With Virtualization And Doubletake
Thomas Deimel The World Of Hackintosh
Joe Mc Glynn Sbs 2008 For The Small Business
Rhonda Layfield Sniffing Your Network With Netmon 3.3
Roger Grimes How I Fixed The Internets
Nathan Winters What’s New And Cool In Ocs 2007 R2

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Spectroscopy.pptx food analysis technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
A Presentation on Artificial Intelligence
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
Spectroscopy.pptx food analysis technology
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
Diabetes mellitus diagnosis method based random forest with bat algorithm
Assigned Numbers - 2025 - Bluetooth® Document
A Presentation on Artificial Intelligence
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
A comparative analysis of optical character recognition models for extracting...

Adfs 2 & claims based identity

Editor's Notes

  • #5: Hard-coded dependencies
  • #6: Re-inventing the wheel – asking our devs to be AD experts
  • #7: Resistance to change – smart card, cloud, etc.
  • #8: Identify the caller (AuthN)Grep information about the caller for AuthZ &amp; personalization
  • #19: Partner fed
  • #21: Fed with the cloud
  • #22: Hide.Fedutil, pre-baked RP trust
  • #25: For WinHIED
  • #26: For WinHIED