- Classic Mode Authentication (default)
- Claims Based Authentication
The new mode of authentication i.e Claims Based works around the concept of an Identity which is based on the standards of WS-Federation, WS-Trust and Protocols like SAML (Security Assertion Markup Language)
It provides a generic way for applications to acquire identity information from users in/across organizations and also on internet.
Identity information is contained in a security token, often simply called a token. A token contains one or more claims (trusted information) about the user. This information stays with them throughout their session.
- Authentication across users of Windows-based systems and systems that are not Windows-based.
- Multiple authentication types.
- Stronger real-time authentication.
- A wider set of principal types.
- Delegation of user identity between applications. (Can resolve Double Hop issues easily)
- Identity: security principal used to configure security policy
- Claim: attribute of an identity (Login Name, AD Group, etc)
- Issuer: trusted party that creates claims
- Security Token: serialized set of claims in digitally signed by issuing authority (Windows security token or SAML)
- Issuing Authority: issues security tokens knowing claims desired by target application
- Security Token Service (STS): builds, signs and issues security tokens
- Relying Party: application that makes authorization decisions based on claims
There are two cases of Claims Incoming and an Outgoing. The scenarios are different in the way they get authenticated or validated. See the images below from the MSDN article.
Hope this gives you a start in understanding a very high level concepts of claims based Security Model in SharePoint 2010.
No comments:
Post a Comment