Security and Identity in the Cloud

Cloud Identity Blog is my way to discuss, show and share information about different technology topics, mainly in the Security, Identity and Access Management areas.

Custom HomeRealmDiscovery Page with AD FS 2.0

Recently I decided to dissect the structure of the default pages in AD FS 2.0 and see what can be...

Author: DmitriiL Date: 09/18/2012

Chaining Multiple STS

A few month ago I learned something about claims based authentication that I thought was not...

Author: DmitriiL Date: 08/18/2012

Authentication Assurance and Claims Based Authentication

Authentication Mechanism Assurance is described in the following Microsoft publication:...

Author: DmitriiL Date: 06/27/2012

New UAG Book - Mastering Microsoft Forefront UAG 2010 Customization

My last few posts were dedicated to customization of the look and feel of the UAG 2010 Logon/Logoff...

Author: DmitriiL Date: 03/27/2012

UAG 2010 Custom Logon and Logoff Pages

Ever needed to modify UAG 2010 default Logon/Logoff pages to something a bit more custom? I did on...

Author: DmitriiL Date: 01/22/2012

UAG 2010 Custom Portal

Ever needed to modify UAG 2010 default portal page to something a bit more custom? I did on one of...

Author: DmitriiL Date: 01/18/2012

UAG 2010 and AD FS v2 White Paper is Published

Over the last three month I published many articles on UAG and AD FS. While it each of the posts...

Author: DmitriiL Date: 11/05/2011

AD FS and UAG are Better Together–Example of a real Solution

In the last nine posts we reviewed different topologies and discussed some of the techniques on how...

Author: DmitriiL Date: 10/29/2011

Designing UAG and AD FS Solution

In the last many posts we looked at all kind of different topologies for UAG and AD FS...

Author: DmitriiL Date: 10/18/2011

UAG and ADFS Better Together–Authentication via Azure ACS

This post discussing how it is possible to publish applications to Internet based users who...

Author: DmitriiL Date: 10/17/2011

UAG and ADFS Better Together–Publishing Applications to Partner Organizations

In this scenario, our partner organization users access claims based applications published by our...

Author: DmitriiL Date: 10/02/2011

UAG and AD FS are Better Together – Publishing Non-Claims Based Applications

In article “UAG and AD FS are Better Together – UAG as AD FS Proxy”  we explored how user...

Author: DmitriiL Date: 09/24/2011

UAG and AD FS are Better Together – Strong Auth to Cloud Based Applications

Today we will discuss a solution that provides the following functionality: You what to require your...

Author: DmitriiL Date: 09/22/2011

UAG and AD FS are Better Together - UAG as AD FS Proxy

In previous topologies (1 and 2) we did not expose AD FS server to the outside users as primary form...

Author: DmitriiL Date: 09/01/2011

UAG and ADFS are Better Together– Strong Authentication

In the previous post we looked at the most common UAG configuration, with user using username and...

Author: DmitriiL Date: 08/25/2011

UAG SP1 and AD FS v2 are Better Together–FBA and Claims

In previous post I started with introduction for UAG and AD FS integrations scenarios. Today post...

Author: DmitriiL Date: 08/22/2011

UAG SP1 and AD FS v2 are Better Together–Introduction

A few weeks ago I started working on a white paper about UAG SP1 and AD FS v2 configuration...

Author: DmitriiL Date: 08/21/2011

WIF Extension for SAML 2.0 Protocol Community Technology Preview!

Today Microsoft announced availability of the WIF Extension for SAML 2.0 Protocol Community...

Author: DmitriiL Date: 05/16/2011

Secure Application Access by using AD FS and UAG – Strong Authentication

In the last two posts on this subject I showed to you how to use UAG with Forms Based Authentication...

Author: DmitriiL Date: 02/21/2011

Microsoft U-Prove Community Technology Preview R2 Released

In case you missed, a few days ago Microsoft released U-Prove Community Technology Preview R2, you...

Author: DmitriiL Date: 02/18/2011

Secure Application Access by using AD FS and UAG – UAG acting as ADFS Proxy Topology

In the previous post I showed to you how UAG can be used with ADFS to publish Claims aware...

Author: DmitriiL Date: 02/16/2011

Secure Application Access with ADFS and UAG – UAG providing FBA

More and more companies wish to provide secure access to their applications from external locations....

Author: DmitriiL Date: 02/15/2011

Microsoft Business Ready Security–Secure Collaboration for Roaming Users with Unified Access Gateway

Did you know that you can download virtual labs to your own host system and test Microsoft Business...

Author: DmitriiL Date: 02/08/2011

Microsoft Business Ready Security–Secure Collaboration with Partners by using AD FS

Did you know that you can download virtual labs to your own host system and test Microsoft Business...

Author: DmitriiL Date: 02/07/2011

Implementing FIM 2010 Certificate Management (Part 4)

This is the fourth and final  installment in a four part series showing how to implement FIM...

Author: DmitriiL Date: 02/03/2011

Implementing FIM 2010 Certificate Management (Part 3)

This is the third installment in a four part series showing how to implement FIM 2010 Certificate...

Author: DmitriiL Date: 02/03/2011

Implementing FIM 2010 Certificate Management (Part 2)

This is the second installment in a four part series showing how to implement FIM 2010 Certificate...

Author: DmitriiL Date: 02/02/2011

Implementing FIM 2010 Certificate Management (Part 1)

Did you have a chance to watch demonstration on how to use FIM 2010 CM for manual certificate...

Author: DmitriiL Date: 02/01/2011

NIST Released 2 Draft Document on Cloud Security

NIST just released 2 draft documents on Cloud Security Guidelines on Security and Privacy in Public...

Author: DmitriiL Date: 01/29/2011

Manual Certificate Enrollment via FIM 2010 Certificate Management

This video demonstration shows how to use FIM 2010 Certificate Management to request and issue an...

Author: DmitriiL Date: 01/29/2011

PKI Installation Made Easy in HD

Who said that implementing PKI is hard? The following one hour video demonstration shows how to...

Author: DmitriiL Date: 01/27/2011

FIM 2010 - Joining Data From Another MA

This video demonstration is another installment in the “Implementing FIM 2010”. It shows how to...

Author: DmitriiL Date: 01/26/2011

cloudidentityblog.com is now live

Hi folks, My new site is now live and kicking, I’ll post the same information on that blog as I do...

Author: DmitriiL Date: 01/20/2011

Implementing FIM 2010 Video Channel

I have started posting High Definition video demonstrations about Implementing Forefront Identity...

Author: DmitriiL Date: 01/19/2011

PKI Video Channel

Over the next few weeks I’ll try to repackage my “PKI Made Easy” video demonstration into HD format...

Author: DmitriiL Date: 01/19/2011

FIM 2010–Importing and Synchronizing Data–Video Demonstration

This is a the second lab from the Implementing Forefront Identity Manager 2010 training. Before...

Author: DmitriiL Date: 01/19/2011

The FIM Experience–Exercise 4–Video Demonstration

This is a continuation of the first lab from the Implementing Forefront Identity Manager 2010...

Author: DmitriiL Date: 01/18/2011

The FIM Experience–Exercise 2 and 3–Video Demonstration

This is a continuation of the first lab from the Implementing Forefront Identity Manager 2010...

Author: DmitriiL Date: 01/18/2011

The FIM Experience–Exercise 1

Here is the recording of the first lab exercise from the Implementing Forefront Identity Manager...

Author: DmitriiL Date: 01/18/2011

PKI Installation Made Easy–Video

Ever wonder how difficult it is to install a two tier PKI system? It is actually not that difficult....

Author: DmitriiL Date: 12/15/2010

FIM CM and Custom Subject Policy Module

Forefront Identity Manager Certificate Management (FIM CM) provides very useful function – it can...

Author: DmitriiL Date: 10/03/2010

Live and Learn

Learned a few little tidy bits this week, or maybe relearned what was known before. But some of it...

Author: DmitriiL Date: 09/24/2010

Open Standard Authentication in the Enterprise, Part 3

  In previous post we started to talk about different SSO solutions.  This post will cover...

Author: DmitriiL Date: 06/15/2010

Open Standard Authentication in the Enterprise, Part 2

  In previous post we started to talk about different complexities of SSO implementations. Lets...

Author: DmitriiL Date: 06/14/2010

Open Standard Authentication in the Enterprise, Part 1

In the next few posts, I’m going to talk about SSO in Enterprise environments, with emphasis...

Author: DmitriiL Date: 06/13/2010

Levels of Assurance and Claims-based authentication

  Federal Agencies must comply with OMB 04-04 publication. There is an established framework...

Author: DmitriiL Date: 06/02/2010

Personally Identifiable Information (PII) and User Anonymity

  Every system and application in Federal Government must adhere to the OMB memorandum M-04-04...

Author: DmitriiL Date: 06/01/2010

Token Policy and STS

If you are familiar with PKI projects you are probably know about Certificate Policy (CP) and...

Author: DmitriiL Date: 12/08/2009

Claim Based Authentication IV

In previous three posts we examined how claim authentication flow works for users in the same domain...

Author: DmitriiL Date: 10/04/2009

Claims Based Authentication – Part III

This is continuation of two previous posts. Please check them out first, otherwise this one might...

Author: DmitriiL Date: 10/03/2009

Next>