360 likes | 556 Views
PR11. Claims based Identity in SharePoint 2010. Venky Veeraraghavan (@ venkyv ) Program Manager Microsoft Corporation. @ SPIdentity on Twitter. Handle for the Identity team in SharePoint Follow us to get updates from us Mention us to get our attention .
E N D
PR11 Claims based Identity in SharePoint 2010 VenkyVeeraraghavan (@venkyv) Program Manager Microsoft Corporation
@SPIdentity on Twitter • Handle for the Identity team in SharePoint • Follow us to get updates from us • Mention us to get our attention
Seamless Identity FlowIn, Through and Out of SharePoint • Use customer Identity Providers • Automatic & secure identity delegation • Authorization over application specific roles • “No-credential” access to web services • Standards based SharePoint Content Hop 3 Enterprise Web Services Hop 1 Hop 2 Web 2.0 Services Client Web Server App Server
Sign-in Scenarios • Sign-in to SharePoint with both Windows and LDAP directory Identity • Easily configure Intranet and Extranet users for Collaboration • Integrate with other customer identity systems (eg. ADFS, etc.) • Use Office Applications with non-Windows Authentication
Identity Normalization -Classic -Claims NT TokenWindows Identity NT TokenWindows Identity SAML1.1+ADFS, etc. ASP.Net (FBA)SAL, LDAP, Custom … SAML Token Claims Based Identity SPUser
Multi-authentication demo
ASP.Net Membership/Role Providers • Convert ASP.Net identity to Claims Identity • SP-STS calls Membership Provider to validate user and issues a claims token • ValidateUser() must be implemented by membership providers • Roles from Role Provider are additional claims • Mixed mode environments • All principals are available in all zones
Services Scenarios • Show user’s PayStub in LOB data without credentials (intranet) • Show real-time order status from supplier inside the enterprise Portal (extranet) • Show information from Web2.0 sites (internet) • Securely deploy SharePoint farm(s) for user identity delegation
Identity Architecture for Services Web Front End Windows Identity or Claims Identity Sign-In Web part, etc. SharePoint STS 1 Windows Identity Framework 2 Client Proxy {Token} 3 OAuth 4 Claims Token SAML App Server {Claims Principal} SharePoint STS Windows Identity Framework 5 SP Service Authorization Kerberos C/D SharePoint Service Claims2Win* Credentials Legacy LOB 6 Secure Store Service 7
What you saw… Steps: Model uses PassThrough Users identity passed through to BCS Runtime WCF Connector requests SAML token from STS STSreturns SAML Token WCF Connector passes Token to External data source SharePoint Server SharePoint STS or External STS External List Token BCS Runtime Web Parts Logged-on user WCF Connector Custom App RST Identity SAML Token Claims Aware Service
Identity and Web2.0 Services • Web2.0 authentication pattern • ‘user consent required for external application (website) to access user’s data’ • Some Examples • OAuth • Windows Live ID • Yahoo! BBAuth • Google Account Auth API (AuthSub) etc.
What you saw: Initial User request SharePoint (e.g. Web part) Auth Handler Page Secure Store BDC Resource Provider (e.g. Netflix) NetFlix Authorization Service
What you saw: Subsequent User requests … SharePoint (e.g. Web part) Auth Handler Page Secure Store BDC Resource Provider (e.g. Netflix) NetFlix Authorization Service
Standards Used • WS-Federation 1.1 • Provides the architecture for a clean separation between trust mechanisms, security tokens formats and the protocols for obtaining tokens • WS-Trust 1.4 • How to request and receive security tokens • SAML Token 1.1 • XML vocabulary used to represent claims in an interoperable way
Key Takeaways • Structural change for SharePoint • Move to Claims based Identity • Support 2007 Authentication • Address today’s and tomorrow’s challenges • Identity Provider neutral • Enterprise as well as Web 2.0 services • Built on Standards for interoperability
YOUR FEEDBACK IS IMPORTANT TO US! Please fill out session evaluation forms online at MicrosoftPDC.com
Learn More On Channel 9 • Expand your PDC experience through Channel 9 • Explore videos, hands-on labs, sample code and demos through the new Channel 9 training courses channel9.msdn.com/learn Built by Developers for Developers….
How Does it Work? Provider (Live Contacts) User’s Browser Consumer app accessing user’s data from the Provider (BDC) 2. User Consent (Redirect user to login page, if not signed in) 1. Direct user to resource provider 3. Re-direct back to consumer app with token • Extract consent token 5. Access protected resource Service 6. Return requested Data (if token is valid)
BCS Authentication Support Matrix n/a x x In code In code In code In code In code
Office Application support • Office Client applications support non-Windows Integrated Authentication • Office 2010 on • Windows XP + IE8 • Windows Vista SP2 or IE8 • Windows 7 • Office 2007 SP2 on • Windows XP + IE8 • Windows Vista SP2 or IE8 • Windows 7