I have:
- A passive STS login application, which is also an identity provider.
- Active STS WCF service that can accept and process ActAs tokens
- Party relying on website
- The WCF service support called by the website.
All of this is compiled using the Windows Identity Foundation and custom STS code. Active Directory (ADFS) is not involved.
Now I have a job:
- The user is trying to visit the RP website.
- The user is redirected to a passive STS.
- The user logs in, receives the issued token, is redirected back to the RP website.
- The RP website calls the WCF RPF service call and passes the ActAs token, so delegation occurs.
- Active STS ActAs , ActAs, Actor.
- WCF RP , , , .
, WCF RP STS.
, RST, STS, , , , , .
, , RP- -, , WCF RP.
, - , . ws2007FederationHttpBinding, ActAs, WIF Identity Training Kit customBinding, , - . WCF RP, :
<system.serviceModel>
<bindings>
<customBinding>
<binding name="CustomBinding_FederatedService">
<security
authenticationMode="IssuedTokenForCertificate"
messageSecurityVersion="WSSecurity11WSTrust13WSSecureConversation13WSSecurityPolicy12BasicSecurityProfile10">
<issuedTokenParameters tokenType="http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1">
<issuer address="http://localhost:38901/ActiveSts.svc/IWSTrust13" />
<issuerMetadata address="http://localhost:38901/ActiveSts.svc/mex" />
</issuedTokenParameters>
</security>
<textMessageEncoding>
<readerQuotas maxArrayLength="32767" />
</textMessageEncoding>
<httpTransport />
</binding>
</customBinding>
</bindings>
</system.serviceModel>
-, requestTypeRequirements issuTokenParameters, Active STS RST..., -, .
, WCF RP , , -?
, , , , . - WCF , , ( ), . , .