Security and Identity in the Cloud
Cloud Identity Blog is my way to discuss, show and share information about different technology topics, mainly in the Security, Identity and Access Management areas.
Custom HomeRealmDiscovery Page with AD FS 2.0
Recently I decided to dissect the structure of the default pages in AD FS 2.0 and see what can be...
Date: 09/18/2012
Chaining Multiple STS
A few month ago I learned something about claims based authentication that I thought was not...
Date: 08/18/2012
Authentication Assurance and Claims Based Authentication
Authentication Mechanism Assurance is described in the following Microsoft publication:...
Date: 06/27/2012
New UAG Book - Mastering Microsoft Forefront UAG 2010 Customization
My last few posts were dedicated to customization of the look and feel of the UAG 2010 Logon/Logoff...
Date: 03/27/2012
UAG 2010 Custom Logon and Logoff Pages
Ever needed to modify UAG 2010 default Logon/Logoff pages to something a bit more custom? I did on...
Date: 01/22/2012
UAG 2010 Custom Portal
Ever needed to modify UAG 2010 default portal page to something a bit more custom? I did on one of...
Date: 01/18/2012
UAG 2010 and AD FS v2 White Paper is Published
Over the last three month I published many articles on UAG and AD FS. While it each of the posts...
Date: 11/05/2011
AD FS and UAG are Better Together–Example of a real Solution
In the last nine posts we reviewed different topologies and discussed some of the techniques on how...
Date: 10/29/2011
Designing UAG and AD FS Solution
In the last many posts we looked at all kind of different topologies for UAG and AD FS...
Date: 10/18/2011
UAG and ADFS Better Together–Authentication via Azure ACS
This post discussing how it is possible to publish applications to Internet based users who...
Date: 10/17/2011
UAG and ADFS Better Together–Publishing Applications to Partner Organizations
In this scenario, our partner organization users access claims based applications published by our...
Date: 10/02/2011
UAG and AD FS are Better Together – Publishing Non-Claims Based Applications
In article “UAG and AD FS are Better Together – UAG as AD FS Proxy” we explored how user...
Date: 09/24/2011
UAG and AD FS are Better Together – Strong Auth to Cloud Based Applications
Today we will discuss a solution that provides the following functionality: You what to require your...
Date: 09/22/2011
UAG and AD FS are Better Together - UAG as AD FS Proxy
In previous topologies (1 and 2) we did not expose AD FS server to the outside users as primary form...
Date: 09/01/2011
UAG and ADFS are Better Together– Strong Authentication
In the previous post we looked at the most common UAG configuration, with user using username and...
Date: 08/25/2011
UAG SP1 and AD FS v2 are Better Together–FBA and Claims
In previous post I started with introduction for UAG and AD FS integrations scenarios. Today post...
Date: 08/22/2011
UAG SP1 and AD FS v2 are Better Together–Introduction
A few weeks ago I started working on a white paper about UAG SP1 and AD FS v2 configuration...
Date: 08/21/2011
WIF Extension for SAML 2.0 Protocol Community Technology Preview!
Today Microsoft announced availability of the WIF Extension for SAML 2.0 Protocol Community...
Date: 05/16/2011
Secure Application Access by using AD FS and UAG – Strong Authentication
In the last two posts on this subject I showed to you how to use UAG with Forms Based Authentication...
Date: 02/21/2011
Microsoft U-Prove Community Technology Preview R2 Released
In case you missed, a few days ago Microsoft released U-Prove Community Technology Preview R2, you...
Date: 02/18/2011
Secure Application Access by using AD FS and UAG – UAG acting as ADFS Proxy Topology
In the previous post I showed to you how UAG can be used with ADFS to publish Claims aware...
Date: 02/16/2011
Secure Application Access with ADFS and UAG – UAG providing FBA
More and more companies wish to provide secure access to their applications from external locations....
Date: 02/15/2011
Microsoft Business Ready Security–Secure Collaboration for Roaming Users with Unified Access Gateway
Did you know that you can download virtual labs to your own host system and test Microsoft Business...
Date: 02/08/2011
Microsoft Business Ready Security–Secure Collaboration with Partners by using AD FS
Did you know that you can download virtual labs to your own host system and test Microsoft Business...
Date: 02/07/2011
Implementing FIM 2010 Certificate Management (Part 4)
This is the fourth and final installment in a four part series showing how to implement FIM...
Date: 02/03/2011
Implementing FIM 2010 Certificate Management (Part 3)
This is the third installment in a four part series showing how to implement FIM 2010 Certificate...
Date: 02/03/2011
Implementing FIM 2010 Certificate Management (Part 2)
This is the second installment in a four part series showing how to implement FIM 2010 Certificate...
Date: 02/02/2011
Implementing FIM 2010 Certificate Management (Part 1)
Did you have a chance to watch demonstration on how to use FIM 2010 CM for manual certificate...
Date: 02/01/2011
NIST Released 2 Draft Document on Cloud Security
NIST just released 2 draft documents on Cloud Security Guidelines on Security and Privacy in Public...
Date: 01/29/2011
Manual Certificate Enrollment via FIM 2010 Certificate Management
This video demonstration shows how to use FIM 2010 Certificate Management to request and issue an...
Date: 01/29/2011
PKI Installation Made Easy in HD
Who said that implementing PKI is hard? The following one hour video demonstration shows how to...
Date: 01/27/2011
FIM 2010 - Joining Data From Another MA
This video demonstration is another installment in the “Implementing FIM 2010”. It shows how to...
Date: 01/26/2011
cloudidentityblog.com is now live
Hi folks, My new site is now live and kicking, I’ll post the same information on that blog as I do...
Date: 01/20/2011
Implementing FIM 2010 Video Channel
I have started posting High Definition video demonstrations about Implementing Forefront Identity...
Date: 01/19/2011
PKI Video Channel
Over the next few weeks I’ll try to repackage my “PKI Made Easy” video demonstration into HD format...
Date: 01/19/2011
FIM 2010–Importing and Synchronizing Data–Video Demonstration
This is a the second lab from the Implementing Forefront Identity Manager 2010 training. Before...
Date: 01/19/2011
The FIM Experience–Exercise 4–Video Demonstration
This is a continuation of the first lab from the Implementing Forefront Identity Manager 2010...
Date: 01/18/2011
The FIM Experience–Exercise 2 and 3–Video Demonstration
This is a continuation of the first lab from the Implementing Forefront Identity Manager 2010...
Date: 01/18/2011
The FIM Experience–Exercise 1
Here is the recording of the first lab exercise from the Implementing Forefront Identity Manager...
Date: 01/18/2011
PKI Installation Made Easy–Video
Ever wonder how difficult it is to install a two tier PKI system? It is actually not that difficult....
Date: 12/15/2010
FIM CM and Custom Subject Policy Module
Forefront Identity Manager Certificate Management (FIM CM) provides very useful function – it can...
Date: 10/03/2010
Live and Learn
Learned a few little tidy bits this week, or maybe relearned what was known before. But some of it...
Date: 09/24/2010
Open Standard Authentication in the Enterprise, Part 3
In previous post we started to talk about different SSO solutions. This post will cover...
Date: 06/15/2010
Open Standard Authentication in the Enterprise, Part 2
In previous post we started to talk about different complexities of SSO implementations. Lets...
Date: 06/14/2010
Open Standard Authentication in the Enterprise, Part 1
In the next few posts, I’m going to talk about SSO in Enterprise environments, with emphasis...
Date: 06/13/2010
Levels of Assurance and Claims-based authentication
Federal Agencies must comply with OMB 04-04 publication. There is an established framework...
Date: 06/02/2010
Personally Identifiable Information (PII) and User Anonymity
Every system and application in Federal Government must adhere to the OMB memorandum M-04-04...
Date: 06/01/2010
Token Policy and STS
If you are familiar with PKI projects you are probably know about Certificate Policy (CP) and...
Date: 12/08/2009
Claim Based Authentication IV
In previous three posts we examined how claim authentication flow works for users in the same domain...
Date: 10/04/2009
Claims Based Authentication – Part III
This is continuation of two previous posts. Please check them out first, otherwise this one might...
Date: 10/03/2009