Exercise 1: Summary

In this first exercise, we have explored how to modify a traditional WCF service in order to use Windows Identity Foundation to authenticate and authorize calls. We have learned about token handlers, ClaimsAuthorizationManager, hosting options and the basics of driving Windows Identity Foundation’s behavior via configuration. Now that we are comfortable with the main differences between the object model used by WCF and the one in Windows Identity Foundation, we can move to consider the more common cases in which we invoke services by using issued tokens.