Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Windows Identity Foundation (Dev - Pro)

Buy

A few years ago, I was sitting at a table playing a game of poker with a few colleagues from Microsoft who had all been involved at various times in the development of Web Services Enhancements for Microsoft .NET (WSE). Don Box, Mark Fussell, Kirill Gavrylyuk, and I played the hands while showman extraordinaire Doug Purdy engaged us with lively banter and more than a few questions about the product—all of this in front of the cameras at the MSDN studios.

We had each selected a person from the field to play for; someone whom we each thought had made a significant contribution to the success of WSE but hadn’t been a direct member of the product team itself. If we won, then our nominee would get a prize, a token of our appreciation for the work that he or she had done. My selection was a guy called Vittorio Bertocci who was working for Microsoft in Italy at the time. I’d never met Vittorio, nor even seen a photo of him, but he was a prolific poster on our internal discussion list, clearly understood the key security concepts for the product including the WS-* protocols, and had even crafted an extension to enable Reliable Messaging despite some of the crude extensibility we had in place at the time. Vittorio was someone worth playing for but, unfortunately, I didn’t win.
Time passed, the Windows Communication Foundation (WCF) superseded WSE, and I moved to become the Architect for the Identity and Access team tasked with building a Security Token Service for Windows Server. One day, out of the blue, I got an e-mail from Vittorio to say that he’d moved to Redmond to take on a Platform Evangelist role and asking if we could meet up. Of course I said yes, but what I couldn’t have anticipated was that mane of jet-black hair....

Vittorio was deeply interested in the work that we were doing to enable a claims-based programming model for .NET, on top of which we planned to build the second version of our security token service. Over time, these ideas became the “Geneva” wave of products and were finally birthed as the Windows Identity Foundation and Active Directory Federation Services 2.0.

(HTML tags aren't allowed.)

Architectural Issues of Web-Enabled Electronic Business
Architectural Issues of Web-Enabled Electronic Business
Web technologies play a critical role in today’s web-enabled e-Business. A key to success in applying the web-based technologies to the real world problems lies in understanding the architectural issues and developing the appropriate methodologies and tools for designing e-Business systems. The main purpose of Architectural Issues of...
Quantum Physics: The Bottom-Up Approach: From the Simple Two-Level System to Irreducible Representations (Graduate Texts in Physics)
Quantum Physics: The Bottom-Up Approach: From the Simple Two-Level System to Irreducible Representations (Graduate Texts in Physics)

This concise tutorial provides the bachelor student and the practitioner with a short text on quantum physics that allows them to understand a wealth of quantum phenomena based on a compact, well readable, yet still concise and accurate description of nonrelativistic quantum theory. This “quadrature of the circle” is achieved by...

Addressing the Human Capital Crisis in the Federal Government : A Knowledge Management Perspective
Addressing the Human Capital Crisis in the Federal Government : A Knowledge Management Perspective
There is a human capital crisis in the federal government: more than 50 percent of federal civil servants will be eligible to retire in the next five years, and 71 percent of these are senior executives. Human capitalthe accumulated value of an individual's intellect, knowledge, and experiencemust be managed so it will not be lost. This book is an...

Design Patterns: Elements of Reusable Object-Oriented Software
Design Patterns: Elements of Reusable Object-Oriented Software

Capturing a wealth of experience about the design of object-oriented software, four top-notch designers present a catalog of simple and succinct solutions to commonly occurring design problems. Previously undocumented, these 23 patterns allow designers to create more flexible, elegant, and ultimately reusable designs without having to...

Marketing Theory: A Student Text
Marketing Theory: A Student Text

As a relatively young, applied discipline, one major challenge for marketing has been to build its own distinct body of theory. One problem for teachers of the subject is that many students find books on marketing theory dense and difficult to follow. Most are written for academics and researchers, not for undergraduates and taught...

Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software Engineering Series)
Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software Engineering Series)
This book is about programming-in-the-large, a term coined by DeRemer and Kron [2] to distinguish the assembly of large applications from components, from the task of implementing those components themselves. Many of the principles of programming-in-the-large were earlier elucidated by Parnas in two articles [3, 4]. It is...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy