using claims based authentication with sharepoint nauzad kapadia

15
Using Claims based authentication with SharePoint Nauzad Kapadia

Upload: donald-alexander

Post on 13-Dec-2015

228 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Using Claims based authentication with SharePoint Nauzad Kapadia

Using Claims based authentication with SharePoint

Nauzad Kapadia

Page 2: Using Claims based authentication with SharePoint Nauzad Kapadia

Identity and Identity Providers

• Digital Persona• Composed of attributes/identifiers• Examples:

– Active Directory, Database, Directory Services

• Can be proved by providing Claims

Attribute Value

Display Name Chris Gideon

Email Address [email protected]

User Name Contoso\cgideon

Title Senior PFE

Page 3: Using Claims based authentication with SharePoint Nauzad Kapadia

What is a Claim?

Information about an identity…Example: Airport

Ticket counterVerificationBoarding Pass IssuedSecurity Check pointBoarding

Issuer: Department of Public Safety

Issuer: Air Line

Full Name Name

Number Frequent flyer number

Address Flight number

Citizenship Seating priority

Date of birth Gate

Date of issue Seat number

Date of expiration Date of issue

Sex bar code and/or the magnetic strip

Picture

Page 4: Using Claims based authentication with SharePoint Nauzad Kapadia

Issuers and Security Tokens

• Issues security tokens• Collection of claims• Formats– SAML

• Signing

Page 5: Using Claims based authentication with SharePoint Nauzad Kapadia

Security Token Service (STS)• Web Service that issues claims and

packages security tokens.• Supports multiple credential types• IP-STS and RP-STS.• An IP-STS is an STS that issues tokens that can be

used to request service tokens from RP-STSs. • An RP-STS can also consume other types of tokens

(or credentials), for example an NT token that comes from the domain controller or the (KDC)

• STSs can be chained

Page 6: Using Claims based authentication with SharePoint Nauzad Kapadia

Relying Party

• An application that relies on claims– claims-based application.

• Relying Party Security Token Service (RP-STS)

Page 7: Using Claims based authentication with SharePoint Nauzad Kapadia

Example - The Airport

AirlineDepartment

of Public Safety

Gate Agent

Trust

Nee

d D

river

s Li

cens

e

Driv

ers

Lice

nse D

rivers License

Boarding Pass

Boarding PassBirth

Records

Page 8: Using Claims based authentication with SharePoint Nauzad Kapadia

SharePoint as a Claims-based application

• SharePoint STS is always relying party STS Built on Windows Identity Foundation (WIF)

• Multiple authentication types• Identity Provider neutral– Configured via Central Admin or PowerShell

• Delegation of user identity between applications.

Page 9: Using Claims based authentication with SharePoint Nauzad Kapadia

SharePoint Claims Overview

SharePoint STSIP-STS

Web App

Trust

Auth

entic

ate

Issu

e to

ken

Send token

Issue token

Send token

Send Cookie

Page 10: Using Claims based authentication with SharePoint Nauzad Kapadia

Browser-based sign-in

Browser Issuer Active DirectoryGet /

302AuthN

SAML Token

Post

Process TokenCookie

Cookie

Process Claims302

Page 11: Using Claims based authentication with SharePoint Nauzad Kapadia

Identity Normalization

NT TokenWindows Identity

ASP.Net (FBA)SAL, LDAP, Custom …

SAML TokenClaims Based

Identity

SPUser

NT TokenWindows Identity

SAMLADFS, Ping, etc.

-Classic -Claims

Page 12: Using Claims based authentication with SharePoint Nauzad Kapadia

Claims Providers

• Retrieve and expose claims – For augmentation• Insert claims into the Security Token

– For setting permissions• give access to “all PMs with blue eyes”

• Deployed via WSP

Page 13: Using Claims based authentication with SharePoint Nauzad Kapadia

Forms Based Authentication

• Exposed through Claims Mode• Implemented as a Claims Provider• Upgrade– Inplace – ACLS updated, web.config not– DBAttach – ACLs updated, no need to

update config

• Provider Neutral– e.g. SQL, LDAP etc

Page 14: Using Claims based authentication with SharePoint Nauzad Kapadia

What changed in FBA

• FBA users are exposed through Claims– Claims identity is created instead of generic

identity– STS talks to membership provider to validate

user and issues a claims token– ValidateUser() must be implemented by

membership providers– Roles are converted to claims

• Mixed mode environments

Page 15: Using Claims based authentication with SharePoint Nauzad Kapadia