Step by Step guide on Federated Authentication in Windows Azure Web Role using Windows Azure App Fabric Access Control Service

In this article I will show you step by step demonstration of enabling Federated Authentication on Windows Azure Web Role using Windows Azure App Fabric Access Control Service.

You are writing an application and want to make it open for users of all the identity providers. You want users of Facebook, Live, Google; Yahoo etc. should be able to use your application. Probably to achieve this task you will have to implement authentication logic for all types of providers separately. For instance there would be separate authentication logic for Facebook, separate authentication logic for Google and so on.

You outsource this authentication task for separate identity provider to Access Control Service. ACS does the task of authentication for your application.

clip_image001

Image taken from MSDN

In this post, I am focusing on demonstrating step by step process to work with Windows Azure ACS. In later post I will discuss more on theory of Claim Based Authentication

You need to work with Windows Azure Access Control Service.

Windows Identity Foundation SDK

Windows Identity Foundation Run Time

Essentially you need to perform two tasks

  1. Configure Windows Azure ACS with Identity Provider, Relying Party, Rules
  2. Create Windows Azure Web Role and configure for Federated authentication

Configure Windows Azure ACS with Identity Provider, Relying Party, Rules

First you need to login to Windows Azure Management portal. Navigate to below link and provide yours live username and password

https://windows.azure.com/

After successful authentication, you need to select Service Bus, Access Control & Caching tab from left panel.

clip_image002

Then choose Access Control from top

clip_image003

You need to have a Namespace.If you are already having a namespace feel free to use that. I assume here you don’t have any namespace created then follow below screens to create namespace.

You need to click on New option at Top panel to create a new namespace.

clip_image004

On clicking of New, you will get Create a new Service Namespace window. For purpose of this article, I am choosing Access Control Service and providing other information in properties tab like Namespace, Country and Subscription

clip_image006

Once Namespace is created you can see that listed. Select newly created Namespace and from top panel choose Access Control Services

clip_image008

Access Control Services will get open in next tab. There from left panel select Identity Providers

clip_image009

On click of Identity providers you can see Windows Live ID is already added. Click on Add button to add another Identity Providers.

clip_image010

On click of Add Button you will get option to add different identity providers. For purpose of this post I am adding Google and Yahoo only.

clip_image011

I have chosen Yahoo. Next you will get prompted to choose Image URL at login screen. This is optional. I have not given any Image URL link here.

clip_image012

In same way you can add Google identity provider as well. After adding all the identity providers you will be getting them listed as below.

clip_image014

Next you need to add Relying Party Application. For that from the left panel click on Relying Part Application and then click on Add button to add new Relying Part Application. You will get screen to Add Relying Party Application. You need to provide all the information on this screen.

clip_image016

You need to provide a friendly name for relying party application. Feel free to give any name of your choice.

clip_image017

You need to select Mode. Choose Mode as Enter setting manually

clip_image018

After selecting Mode, you need to provide Realm, Return URL and Error URL.

We may have two scenarios here

  1. Running Azure Web Role in Locally in Azure Emulator
  2. Running Azure Web Role in Azure Portal

If you are running web role locally then set URL as http://127.0.0.1:81/

If you are running web role from Azure portal the set URL as you chosen there. That might look like http://abcurname.cloudapp.net

For both Realm and Return give the same URL and if you want you can leave optional error URL.

clip_image020

Leave Token Format, Token Encryption Policy and Token Lifetime as default.

clip_image021

Next you need to select identity providers for this relying party. Select all the identity providers we added previously.

clip_image022

Choose to create new rule group.

clip_image023

Select token signing as standard and click on save button to add a relying party application.

clip_image024

Next step you need to create Rule Groups for Relying party application. To create Rule Group click on Rule Groups from left panel and select Add

clip_image026

Next enter name of Rule Group and click on Save button

clip_image027

You will get an error message to generate rule. Click on Generate button to create rule.

clip_image029

Next you will get prompted to provide identity provider to generate rules. Select all listed identity provider and click on Generate button.

clip_image030

On next screen you need to click on save button. After saving in left panel click on Application integration from Development tab. You need WS-Federation MetaData to configure authentication mechanism for application.

clip_image031

Create Windows Azure Web Role and configure for Federated authentication

Now you need to create Windows Azure project. To create open visual studio as administrator and from cloud tab select Windows Azure Project.

clip_image033

Then choose ASP.Net Web Role as part of Windows Azure project.

clip_image035

Here you can write all required code and business logic of your application. Now to use ACS Federated authentication, right click on web application project and select add STS Reference

clip_image036

Now you need to provide

  1. Application Configuration location :Leave default value
  2. Application URI: It would be same as Replying Party Application URI. In our case it is URI of Azure web role running in azure emulator http://127.0.0.1:81/

 

clip_image037

On clicking of Next Button you will get a warning message that application is not using HTTPS. In real application best practice is to provide certificate and work with secure Http. Proceed with selecting yes.

clip_image038

In Security Token Service check the check box Use and existing STS and there you need to provide Meta Data document location. If you remember in previous step you copied an WS-Federation MetaData URL by clicking on Application integration from Development tab. You need to provide location of XML file from different End Point references.

clip_image040

On next screen choose Disable certificate chain validation.

clip_image042

On next screen select no encryption

clip_image044

On next screen leave the default values and click on next .

clip_image045

Finally click on Finish to complete add process. You should be getting Success message as below,

clip_image046

Last step you need to do is open Web.Config file and edit the entry as below. You need to add below line in rectangle in System.web

clip_image047

Now go ahead and run application. You will get prompted to Sign In. Choose any identity provider to log in to your application

clip_image048

I am choosing Google. I will be redirected to Google Login page

clip_image050

After successful Sign in you will get redirected to the application.

clip_image052

This is all you need to do to perform Federated authentication on Windows Azure web role using Windows Azure App Fabric Access Control Service. I hope this post is useful. Thanks for reading Smile

 

If you find my posts useful you may like to follow me on twitter http://twitter.com/debug_mode or may like Facebook page of my blog http://www.facebook.com/DebugMode.Net If you want to see post on a particular topic please do write on FB page or tweet me about that, I would love to help you.

9 responses to “Step by Step guide on Federated Authentication in Windows Azure Web Role using Windows Azure App Fabric Access Control Service”

  1. Attention grabbing depiction of Federated Authentication. Great project. Thanks!

  2. Very nice article. I have one question that can I use the same idea of Federated Authentication in SharePoint Public Facing web site. Did you ever tried that?

  3. How to get logged in user details ,i.e email-id of the logged in user ?

  4. […] Step by Step guide on Federated Authentication in Windows Azure Web Role using Windows Azure App Fab… […]

  5. Well Done Job!! Very nice article. I really enjoyed it during reading. And it also cleared lot of my doubts about Create ASP.Net Web role in Windows Azure Application. You made it very helpful. Check this helpful links too, it helped me in completing my task…..

    http://www.mindstick.com/Articles/3a635747-dd48-4908-88e7-138864290196/?Create%20ASP.Net%20Web%20role%20in%20Windows%20Azure%20Application

    http://blogs.msdn.com/b/avkashchauhan/archive/2011/11/08/developing-asp-net-mvc4-based-windows-azure-web-role.aspx

  6. Nice, it works! It would take me hours to figure this out 🙂

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create a website or blog at WordPress.com