设为首页 收藏本站
查看: 417|回复: 0

[经验分享] Understanding SharePoint 2010 Claims Authentication

[复制链接]

尚未签到

发表于 2015-9-25 11:51:56 | 显示全部楼层 |阅读模式
  from:http://blogs.msdn.com/b/russmax/archive/2010/05/27/understanding-sharepoint-2010-claims-authentication.aspx
  Claims
  An identity provider makes claims about a user. A good example of an identity provider is Live ID. So Live ID will claim to have attributes and their values. For Example:
  Identity Provider "provider of the attributes" contains username attribute containing DanCan. A custom identity provider created by a hacker also contains an account with username attribute named DanCan. Both identity providers are making claims about a user. The consumer "SharePoint 2010" must choose which claim it's going to trust. SharePoint 2010 by itself will never trust either claim without being told to do so. In order for SharePoint to use a claim, it must first trust that claim which is setup by you the SharePoint administrator. If claims are trusted, then SharePoint can authenticate and authorize over that claim.
  
  
  
  STS
  STS is built on Geneva framework which is now called Windows Identity Foundation. The STS (Security Token Service) core responsibility is issuing, managing, and validating security tokens. An STS resides on both an identity provider and SharePoint. STS is built on top of the shared services framework which is why it's listed as a service application within Central Administrator\Manage Service Applications page:
DSC0000.jpg
DSC0001.jpg
  Above, STS is composed of a web service and runs on every SharePoint server.
  Authentication
  The authentication type is setup at the Web Application level when creating a new SharePoint web application. It's possible to choose either classic authentication or Claims authentication. Each one is discussed below:
  
  Classic
  Active Directory authenticates a user, provides an NT Token. The token is used to authenticate to SharePoint. SharePoint consumes that token and it's converted into an SPUser object for authorization.
  Note: Authorization is the process of determining what level of access an authenticated user has to a secured resource such as a Site, Document library etc.. The authorization mechanism hasn't changed in SharePoint 2010 and we ultimately still use an SPUser object to authorize.
  
  
  Claims
  After a trust is established between SharePoint and an Identity provider, web applications can be set with Claims authentication type instead of classic. If a client attempts to authenticate to a claims aware web application, SharePoint redirects a client to the associated trusted identity provider. The identity provider authenticates clients and provides a security token. That token could be either of the following:
  · NT Token
  · SAML Token
  This security token is this passed to SharePoint STS. In short, the STS will validate the token "Claims Based Identity" and generate a new security "SAML" token back to the client. This token is generated by SharePoint and for SharePoint. The client sends this SAML token to SharePoint to prove that he/she is officially authenticated. SharePoint validates and authenticates user and an SPUser object is created and is used for authorization.
  
  Steps for Claims Sign-In:
  1. Client hit SharePoint site via HTTP (Get)   
2. SharePoint redirects client to Identity Provider in order to get a security token   
3. Client attempts to authenticate to trusted Identity Provider   
4. The identity provider's (Security Token Service) will validate the username and password and provide a security token to a client.
  Note: A security token could be a Windows NT Token, SAML token, or FBA token
  5. The client has a security token (authenticated) and submits it to SharePoint STS "Security Token Service"   
6. SharePoint STS receives security token from client and determines if we trust the issuer of that token "Identity Provider"   
7. STS then performs claims augmentation   
8. STS issues client new SAML token   
9. Client request resource "site" with new SAML token   
10. SharePoint consumes SAML token, "validates authentication successful", and builds an SPUser object in order to authorize to the secured resource
  
  Mixed Authentication
  In SharePoint 2007, to use additional authentication provider, you had to extend the web application and drop it in a different zone so it would contain a different URL. SharePoint 2007 wasn't flexible in terms of specifying multiple authentication types in a single un-extended web application.
  
  
  Multi Authentication
  In SharePoint 2010, it's possible to configure multiple authentication types for a single web application. This provides 2 benefits:
  1. No longer required to extend web-application for the purpose of adding additional authentication types
  2. Can have a single web application use multiple authentication types which provides the ability to serve a single URL!
  
DSC0002.png
  
  Note: You can still extend web-applications and assign one or more authentication types to it if a business justification calls for that.
  
  
  
  FBA
  FBA users no longer uses an ASP.Net identity. FBA is now claims aware and the SharePoint STS facilitates the authentication process. Once user is authenticated, the SharePoint STS provides a SAML token to the client.
  Note: When creating a web application designated for FBA, you must specify claims authentication type.
  STS (federated equivalent of a domain controller) "issues tokens"
  Basic FBA Sign-in process:
  1. User signs in via FBA with credentials   
2. SharePoint STS calls membership provider to authenticate   
3. SharePoint STS calls role provider to get all the roles for the user   
4. Post successful authentication, a SAML token is generated by the SharePoint STS and passed back to the user   
5. The user then authenticates to SharePoint with SAML token and authentication is officially completed
  For setup steps, please see my blog for more details.
  
  
  
  
  
  
  
  How Claims works with Services
  
  Accessing Internal Services
  Within a Single Farm:
  The classic example is a user performing a search. The WFE's (Server1) search web part talks to service application proxy. The associated search service application proxy calls the local STS to get a SAML token for the user. Once SAML token is collected, the search service application proxy then calls a server running the Query Processor via WCF call. I'll call this server, "Server 2". Server 2 receives the incoming request and validates the SAML token against its local STS. Once validated, Server 2 connects to various components to gather, merge, and security trims search results. Server 2 sends the trimmed search results back to Server 1 which are then presented to the user.
  
  Accessing External Services
  SharePoint 2010 STS can manipulate a SAML token in order to present it to an external web service. The way it presents the identity depends on the type of external web service. The goal is preventing the additional prompt for credentials so that a full Single Sign-On (SSO) experience is possible. The STS is comprised of the WIF "Windows Identity Framework" and also the C2WTS. Each component is used dependent upon the type of external service accessed.
  
  
  C2WTS = Claims to Windows Token Service
  If accessing a native windows application that expects a Kerberos ticket. Within SharePoint STS, we use C2WTS to use existing SAML token in order to create a windows token (Kerberos ticket) to authenticate.
  http://msdn.microsoft.com/en-us/library/ee517278.aspx
  
  SharePoint STS
  Can be used to just issue SAML token to pass to external systems that support SAML tokens
  Secure Store Service
  SharePoint can be used to connect to a legacy LOB systems which requires credentials. (SSS) Captures credentials and uses them on web service call to login and go inside.
  http://msdn.microsoft.com/en-us/library/ee557754.aspx

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-118656-1-1.html 上篇帖子: SharePoint权限控制的问题(求解) 下篇帖子: 修复moss本机访问SharePoint 401.1 HTTP错误
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表