Security and Identity in the Cloud

Cloud Identity Blog is my way to discuss, show and share information about different technology topics, mainly in the Security, Identity and Access Management areas.

Browse by Tags

Related Posts
  • Blog Post: UAG and AD FS are Better Together – Publishing Non-Claims Based Applications

    In article “ UAG and AD FS are Better Together – UAG as AD FS Proxy ”  we explored how user authenticates to UAG portal via claims based authentication and then accesses claims based application published via UAG portal. But what if published application does not support claims based authentication...
  • Blog Post: UAG and ADFS are Better Together– Strong Authentication

    In the previous post we looked at the most common UAG configuration, with user using username and password for authentication to UAG. In this post we are going to explorer the following  configuration – user authenticates to UAG Portal via Certificate Based Authentication (Soft Certificate or Smart...
  • Blog Post: Secure Application Access by using AD FS and UAG – Strong Authentication

    In the last two posts on this subject I showed to you how to use UAG with Forms Based Authentication and as ADFS Proxy. Todays demonstration shows how to use it with Strong Authentication – Certificate Authentication. The topology in this configuration is very similar to the FBA topology, but it requires...
  • Blog Post: Authentication Assurance and Claims Based Authentication

    Authentication Mechanism Assurance is described in the following Microsoft publication: http://technet.microsoft.com/en-us/library/dd378897(v=WS.10).aspx . In this post I want to dig a bit more into different configuration options, show how it works and provide example of how it can be configured with...