Saturday, April 28, 2012

Create Claims-Enabled Applications Using Packt's New Book and eBook



Packt is pleased to announce the publication of Microsoft Windows Identity Foundation Cookbook, a new book and eBook for developers, which contains over 30 recepies that will help them master claims-based access control in ASP.NET MVC 3 applications using Windows Identity Foundation and Access Control Services.

About the author:
A technology enthusiast, Sandeep Chanda is not only a Director of Solutions at Neudesic but also a Microsoft National Systems Integrator, Gold Certified Partner and speaker at various corporate events and public webinars. His expertise lies in several Microsoft Technologies and has authored many articles in online developer magazine. Service Oriented Computing, Pervasive Computing and Haptic Devices are his areas of interest.

Windows Identity Foundation enables .NET developers to externalize identity logic from their application, improving developer productivity, enhancing application security, and enabling interoperability. It is part of Microsoft's identity and access management solution built on Active Directory.

Microsoft Windows Identity Foundation Cookbook will allow developers to master the different ways to extend the available runtime for a customized implementation across interoperable platforms and support OASIS SAML 2.0 profiles for security token exchange in Passive Federation scenarios. Furthermore, the book explores AD FS 2.0 and features recipes showcasing steps to configure claims in Microsoft's server technologies.

This book covers all aspects that professionals face while enabling support for claims-based identity, provide implementation of security token services and building claims-enabled applications. It will not only enable readers to leverage cloud based access control services in their application but also implement enterprise-wide scalable and interoperable applications.

Some of the chapters emphasized in this book are:
Chapter 1: Overview of Claims-based Identity
Chapter 2: Programming with Windows Identity Foundation
Chapter 3: Advanced Programming with Windows Identity Foundation
Chapter 4: Cloud-based Identity with Azure Access Control Service
Chapter 5: Identity Management with Active Directory Federation Services
Chapter 6: Enterprise Server Interoperability with WIF, Azure ACS 2.0, and AD FS 2.0
Chapter 7: Extension and Future of Windows Identity Foundation

No comments: