Have you heard people talking about things like “claims-based authentication and authorization” or “federated identity” and wondered what the heck that’s all about? Do you have a need to host a solution outside of your firewall, say Windows Azure maybe (or any other hosting provider for that matter), but still use your Active Directory accounts to authenticate? Are you looking to allow organizations outside of your own to have access to your systems without having to add their individuals to your Active Directory? If you answered yes to any of these, then you should check out the June 23rd developer dinner on the Windows Identity Foundation (WIF) and Active Directory Federation Services (ADFS) v2.
Joel just blogged about this on my team blog with a curious title of “If you are a government developer please read this”:
Any “enterprise” customer really should read this guide and start thinking about moving towards a clams-based approach. Furthermore, if you want to move your apps to the cloud, then a claims-based approach is a no brainer. In most cases, it is a must!