Security and Identity in the Cloud

Cloud Identity Blog is my way to discuss, show and share information about different technology topics, mainly in the Security, Identity and Access Management areas.

Browse by Tags

Related Posts
  • Blog Post: Chaining Multiple STS

    A few month ago I learned something about claims based authentication that I thought was not possible. Ever since starting working on federation solutions, and learning about it via training courses, reading white papers, specifications and presentations the following two topologies were always shown...
  • Blog Post: NIST Released 2 Draft Document on Cloud Security

    NIST just released 2 draft documents on Cloud Security Guidelines on Security and Privacy in Public Cloud Computing: SP 800-144   (DRAFT) http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800-144_cloud-computing.pdf NIST Definition of Cloud Computing: SP 800-145 (DRAFT) http://csrc.nist...
  • Blog Post: Secure Application Access by using AD FS and UAG – UAG acting as ADFS Proxy Topology

    In the previous post I showed to you how UAG can be used with ADFS to publish Claims aware application and provide single sign-on into  such applications along with traditional applications which require UserID/password. In that demonstration UAG was configured with Form Based Authentication (FBA...
  • Blog Post: Authentication Assurance and Claims Based Authentication

    Authentication Mechanism Assurance is described in the following Microsoft publication: http://technet.microsoft.com/en-us/library/dd378897(v=WS.10).aspx . In this post I want to dig a bit more into different configuration options, show how it works and provide example of how it can be configured with...