Implementing Claims-Based Authentication with SharePoint Server 2010 (whitepaper)
Check it out!
Published: September 27, 2011
This white paper describes how Web applications in Microsoft SharePoint Server 2010 can use claims-based authentication to provide authenticated access to entities that are external to your organization and enable multiple authentication types within a single zone.
It also provides many of the details related to setting up a trust configuration, an explanation of runtime considerations and management, configuration details, and programmatic implementations or use of the extensibility points that turn federated access into a federated SharePoint Server 2010 business solution. In addition, this white paper provides guidance in the following areas:
- Overview of Claims-based Identity in SharePoint Server 2010
- SharePoint Server 2010 with Active Directory Federation Services 2.0
- Creating Multiple Claims Authentication Web Applications in a Single SharePoint Server 2010 Farm
- Setting the Login Token Expiration Correctly for SharePoint Server 2010 SAML Claims Users
- Creating a Custom Claims Provider
- Migration of Users in Classic Mode to Trusted Provider Claims
- How to Enable Tracing for SharePoint Server 2010 Claims
- Trusted Identity Providers and User Profile Synchronization
- Using Audiences with Claims-Based Sites
- Implications of Claims Mode Authentication on Service Applications
- Service Applications and the C2WTS
- Using Active Authentication for Custom Development in SharePoint Server 2010 Claims Authentication Web Applications
Download the white paper
Implementing Claims Based Authentication with SharePoint Server 2010 (whitepaper) ( https://go.microsoft.com/fwlink/?LinkId=229109 )
( Please forgive the typos. Anywhere ADFS was in the paper was find-replaced with AD FS broke the code examples and powershell. I am working to get that revised currently. Also special thanks to a couple of the authors/contributers who are missing from the credits - Adam Conkle and Tyler Durham. )