SlideShare a Scribd company logo
Windows Azure Access Control List
During the implementation of the project e-SUAP was tested technology of windows Azure ACS for security
management which ended up being very interesting.
Most developers are not identity experts and do not want to spend time developing authentication and
authorization mechanisms for their applications and services. ACS is an Azure service that provides an easy
way for you to authenticate users to access your web applications and services without having to add
complex authentication logic to your code.
The following features are available in ACS:
 Integration with Windows Identity Foundation (WIF).
 Support for popular web identity providers (IPs) including Microsoft accounts (formerly known as Windows
Live ID), Google, Yahoo, and Facebook.
 Support for Active Directory Federation Services (AD FS) 2.0.
 An Open Data Protocol (OData)-based management service that provides programmatic access to ACS
settings.
 A Management Portal that allows administrative access to the ACS settings.
Concepts
ACS is built on the principles of claims-based identity -- a consistent approach to creating authentication
mechanisms for applications running on-premises or in the cloud. Claims-based identity provides a
common way for applications and services to get the identity information they need about users inside
their organization, in other organizations, and on the Internet.
To complete the tasks in this guide, you should understand the following terms and concepts are used in
this guide:
Client - A browser that is attempting to gain access to your web application.
Relying party (RP) application - Your web app. An RP application is a website or service that outsources
authentication to one external authority. In identity jargon, we say that the RP trusts that authority. This
guide explains how to configure your application to trust ACS.
Token - A user gains access to an RP application by presenting a valid token that was issued by an authority
that the RP application trusts. A collection of security data that is issued when a client is authenticated. It
contains a set of claims, which are attributes of the authenticated user, such as a user's name or age, or an
identifier for a user role. A token is digitally signed so its issuer can be identified and its content cannot be
changed.
Identity Provider (IP) - An authority that authenticates user identities and issues security tokens, such as
Microsoft account (Windows Live ID), Facebook, Google, Twitter, and Active Directory. When ACS is
configured to trust an IP, it accepts and validates the tokens that the IP issues. Because ACS can trust
multiple IPs at the same time, when your application trusts ACS, you can your application can offer users
the option to be authenticated by any of the IPs that ACS trusts on your behalf.
Federation Provider (FP) - Identity providers (IPs) have direct knowledge of users, authenticate users by
using their credentials, and issue claims about users. A Federation Provider (FP) is a different kind of
authority. Instead of authenticating users directly, the FP brokers authentication. It acts as an intermediary
between a relying party application and one or more IPs. ACS is a federation provider (FP).
ACS Rule Engine - Claims transformation rules convert the claims in tokens from trusted IPs so they can be
used by an RP. ACS includes a rule engine that applies the claims transformation rules that you specify for
your RP.
Access Control Namespace - Provides a unique scope for addressing ACS resources within your application.
The namespace contains your settings, such as the IPs you trust, the RP applications you want to serve, the
rules that you apply to incoming tokens, and it displays the endpoints that the application and the
developer use to communicate with ACS.
The following figure shows how ACS authentication works with a web application:
 The client (in this case, a browser) requests a page from the RP.
 Since the request is not yet authenticated, the RP redirects the user to the authority that it trusts,
which is ACS. The ACS presents the user with the choice of IPs that were specified for this RP. The
user selects the appropriate IP.
 The client browses to the IP's authentication page, and prompts the user to log on.
 After the client is authenticated (for example, the identity credentials are entered), the IP issues a
security token.
 After issuing a security token, the IP directs the client to send the security token that the IP issued
to ACS.
 ACS validates the security token issued by the IP, inputs the identity claims in this token into the
ACS rules engine, calculates the output identity claims, and issues a new security token that
contains these output claims.
 ACS directs the client to send the security token that ACS issued to the RP. The RP validates the
signature on the security token, extracts claims for use by the application business logic, and
returns the page that was originally requested.

e-SUAP - Security - Windows azure access control list (english version)
The namespace NET Framework 4.5 for the management of the claims within the application code, in the
case of a NET application, is System.Security.Claims.
http://msdn.microsoft.com/it-it/library/system.security.claims(v=vs.110).aspx

More Related Content

PDF
Claim based authentaication
PPTX
Claims Based Authentication A Beginners Guide
DOC
TMCnet final
PPTX
Security
PPTX
Claims Based Identity In Share Point 2010
PPTX
70 346 Managing office 365 identities
PDF
Understanding Claim based Authentication
PPTX
Authentication, authorization, accounting(aaa) slides
Claim based authentaication
Claims Based Authentication A Beginners Guide
TMCnet final
Security
Claims Based Identity In Share Point 2010
70 346 Managing office 365 identities
Understanding Claim based Authentication
Authentication, authorization, accounting(aaa) slides

What's hot (14)

PPT
DOCX
AAA server
PPTX
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
PPT
Silicon Valley Code Camp 2009: OAuth: What, Why and How
PDF
Authentication through Claims-Based Authentication
PPT
SSO_Good_Bad_Ugly
PPTX
Presentation
PPT
Single sign on assistant an authentication brokers
PPTX
AAA Implementation
PPTX
O auth2 with angular js
PPTX
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
PPTX
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
PPTX
Understanding Security for Oracle WebLogic Server
PDF
Multi-Factor Authentication & Authorisation
AAA server
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Silicon Valley Code Camp 2009: OAuth: What, Why and How
Authentication through Claims-Based Authentication
SSO_Good_Bad_Ugly
Presentation
Single sign on assistant an authentication brokers
AAA Implementation
O auth2 with angular js
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
Understanding Security for Oracle WebLogic Server
Multi-Factor Authentication & Authorisation
Ad

Viewers also liked (18)

DOC
Resultado del primer festival
DOCX
Frisa de numeros
DOCX
Entrevista docente practica tics
DOCX
Codigos baja
PDF
Weekly news from WCUMC 8 23 2015
PDF
Voulez-Vous BOOGALOO TWIGGY POSTER
PPTX
Size Acceptance & Health at Every Size for MFTs
DOC
BPG Letter of Recommendation
PPTX
Nini maz lapeira actividad1_mapa_conceptual.pdf
PDF
Robert Cossel Certs & Awards
PPTX
PDF
Gr+ífico diario del ibex 35 para el 30 08 2013
PPT
Influencia del Consumidor y la Difusión de la Innovación
PPT
Windows 10 Presentation
PPTX
Amanda Bueno I therapy III Jornada de Neurociência CENEP
PPT
(172) Escuela y barrio, espacios compartidos de convivencia y aprendizaje par...
PPTX
Fisiología del sistema cardiovascular
PDF
Aerogel world’s lightest material
Resultado del primer festival
Frisa de numeros
Entrevista docente practica tics
Codigos baja
Weekly news from WCUMC 8 23 2015
Voulez-Vous BOOGALOO TWIGGY POSTER
Size Acceptance & Health at Every Size for MFTs
BPG Letter of Recommendation
Nini maz lapeira actividad1_mapa_conceptual.pdf
Robert Cossel Certs & Awards
Gr+ífico diario del ibex 35 para el 30 08 2013
Influencia del Consumidor y la Difusión de la Innovación
Windows 10 Presentation
Amanda Bueno I therapy III Jornada de Neurociência CENEP
(172) Escuela y barrio, espacios compartidos de convivencia y aprendizaje par...
Fisiología del sistema cardiovascular
Aerogel world’s lightest material
Ad

Similar to e-SUAP - Security - Windows azure access control list (english version) (20)

PDF
Claims based identity second edition device
PPTX
Federated and fabulous identity
PDF
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
DOCX
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
CTU June 2011 - Windows Azure App Fabric
PPTX
Leveraging the azure cloud for your mobile apps
PPTX
Single Sign-On security issue in Cloud Computing
PPT
21 security and_trust
PPTX
information security(authentication application, Authentication and Access Co...
PDF
O Dell Secure360 Presentation5 12 10b
PPTX
Securing SharePoint Apps with OAuth
PPTX
Claim Based Authentication in SharePoint 2010 for Community Day 2011
PPTX
Identity & access management jonas syrstad
Claims based identity second edition device
Federated and fabulous identity
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
CTU June 2011 - Windows Azure App Fabric
Leveraging the azure cloud for your mobile apps
Single Sign-On security issue in Cloud Computing
21 security and_trust
information security(authentication application, Authentication and Access Co...
O Dell Secure360 Presentation5 12 10b
Securing SharePoint Apps with OAuth
Claim Based Authentication in SharePoint 2010 for Community Day 2011
Identity & access management jonas syrstad

More from Sabino Labarile (20)

PPT
SUE AGILE - Presentazione della piattaforma
PDF
Manuale utente SUE AGILE
PPT
SUE AGILE Framework (Italiano)
PPT
SUE AGILE Architettura (Italiano)
PDF
SUE AGILE MVVM (English)
PDF
SUE AGILE MVVM (Italian)
PPT
SUE AGILE Framework (English)
PPT
SUE AGILE Architecture (English)
PPTX
SUE AGILE - GUIDA ALL'UTILIZZO DELLA PIATTAFORMA
PPTX
e-suap - client technologies- english version
PPTX
e-suap cloud computing- English version
PDF
e-SUAP - Ochestration building block (italian)
PDF
e-SUAP - Ochestration building block (english)
PDF
e-SUAP - Security - Windows azure access control list (italian version)
PDF
e-SUAP - General software architecture (Italiano)
PPT
E suap - tecnologie client
PDF
e-SUAP - Data access server side (English)
PPT
e-suap - general software architecture (English)
PDF
e-SUAP - General software architecture (English)
PPT
E suap - cloud computing (Italian)
SUE AGILE - Presentazione della piattaforma
Manuale utente SUE AGILE
SUE AGILE Framework (Italiano)
SUE AGILE Architettura (Italiano)
SUE AGILE MVVM (English)
SUE AGILE MVVM (Italian)
SUE AGILE Framework (English)
SUE AGILE Architecture (English)
SUE AGILE - GUIDA ALL'UTILIZZO DELLA PIATTAFORMA
e-suap - client technologies- english version
e-suap cloud computing- English version
e-SUAP - Ochestration building block (italian)
e-SUAP - Ochestration building block (english)
e-SUAP - Security - Windows azure access control list (italian version)
e-SUAP - General software architecture (Italiano)
E suap - tecnologie client
e-SUAP - Data access server side (English)
e-suap - general software architecture (English)
e-SUAP - General software architecture (English)
E suap - cloud computing (Italian)

Recently uploaded (20)

PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
AI in Product Development-omnex systems
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
ai tools demonstartion for schools and inter college
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Digital Strategies for Manufacturing Companies
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
System and Network Administraation Chapter 3
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
medical staffing services at VALiNTRY
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Upgrade and Innovation Strategies for SAP ERP Customers
PTS Company Brochure 2025 (1).pdf.......
How to Choose the Right IT Partner for Your Business in Malaysia
AI in Product Development-omnex systems
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
ai tools demonstartion for schools and inter college
CHAPTER 2 - PM Management and IT Context
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Navsoft: AI-Powered Business Solutions & Custom Software Development
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
wealthsignaloriginal-com-DS-text-... (1).pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Digital Strategies for Manufacturing Companies
Design an Analysis of Algorithms II-SECS-1021-03
System and Network Administraation Chapter 3
Operating system designcfffgfgggggggvggggggggg
medical staffing services at VALiNTRY
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...

e-SUAP - Security - Windows azure access control list (english version)

  • 1. Windows Azure Access Control List During the implementation of the project e-SUAP was tested technology of windows Azure ACS for security management which ended up being very interesting. Most developers are not identity experts and do not want to spend time developing authentication and authorization mechanisms for their applications and services. ACS is an Azure service that provides an easy way for you to authenticate users to access your web applications and services without having to add complex authentication logic to your code. The following features are available in ACS:  Integration with Windows Identity Foundation (WIF).  Support for popular web identity providers (IPs) including Microsoft accounts (formerly known as Windows Live ID), Google, Yahoo, and Facebook.  Support for Active Directory Federation Services (AD FS) 2.0.  An Open Data Protocol (OData)-based management service that provides programmatic access to ACS settings.  A Management Portal that allows administrative access to the ACS settings. Concepts ACS is built on the principles of claims-based identity -- a consistent approach to creating authentication mechanisms for applications running on-premises or in the cloud. Claims-based identity provides a common way for applications and services to get the identity information they need about users inside their organization, in other organizations, and on the Internet. To complete the tasks in this guide, you should understand the following terms and concepts are used in this guide: Client - A browser that is attempting to gain access to your web application. Relying party (RP) application - Your web app. An RP application is a website or service that outsources authentication to one external authority. In identity jargon, we say that the RP trusts that authority. This guide explains how to configure your application to trust ACS. Token - A user gains access to an RP application by presenting a valid token that was issued by an authority that the RP application trusts. A collection of security data that is issued when a client is authenticated. It contains a set of claims, which are attributes of the authenticated user, such as a user's name or age, or an
  • 2. identifier for a user role. A token is digitally signed so its issuer can be identified and its content cannot be changed. Identity Provider (IP) - An authority that authenticates user identities and issues security tokens, such as Microsoft account (Windows Live ID), Facebook, Google, Twitter, and Active Directory. When ACS is configured to trust an IP, it accepts and validates the tokens that the IP issues. Because ACS can trust multiple IPs at the same time, when your application trusts ACS, you can your application can offer users the option to be authenticated by any of the IPs that ACS trusts on your behalf. Federation Provider (FP) - Identity providers (IPs) have direct knowledge of users, authenticate users by using their credentials, and issue claims about users. A Federation Provider (FP) is a different kind of authority. Instead of authenticating users directly, the FP brokers authentication. It acts as an intermediary between a relying party application and one or more IPs. ACS is a federation provider (FP). ACS Rule Engine - Claims transformation rules convert the claims in tokens from trusted IPs so they can be used by an RP. ACS includes a rule engine that applies the claims transformation rules that you specify for your RP. Access Control Namespace - Provides a unique scope for addressing ACS resources within your application. The namespace contains your settings, such as the IPs you trust, the RP applications you want to serve, the rules that you apply to incoming tokens, and it displays the endpoints that the application and the developer use to communicate with ACS. The following figure shows how ACS authentication works with a web application:
  • 3.  The client (in this case, a browser) requests a page from the RP.  Since the request is not yet authenticated, the RP redirects the user to the authority that it trusts, which is ACS. The ACS presents the user with the choice of IPs that were specified for this RP. The user selects the appropriate IP.  The client browses to the IP's authentication page, and prompts the user to log on.  After the client is authenticated (for example, the identity credentials are entered), the IP issues a security token.  After issuing a security token, the IP directs the client to send the security token that the IP issued to ACS.  ACS validates the security token issued by the IP, inputs the identity claims in this token into the ACS rules engine, calculates the output identity claims, and issues a new security token that contains these output claims.  ACS directs the client to send the security token that ACS issued to the RP. The RP validates the signature on the security token, extracts claims for use by the application business logic, and returns the page that was originally requested.
  • 4.
  • 6. The namespace NET Framework 4.5 for the management of the claims within the application code, in the case of a NET application, is System.Security.Claims. http://msdn.microsoft.com/it-it/library/system.security.claims(v=vs.110).aspx