Windows live id authentication




















The SSO provider permits users to make a connection to a network before logging on to the local computer. When this provider is implemented, the provider does not enumerate tiles on Logon UI. Network authentication and computer logon are handled by different credential providers. Variations to this scenario include:. A user has the option of connecting to a network, such as connecting to a virtual private network VPN , before logging on to the computer but is not required to make this connection.

Network authentication is required to retrieve information used during interactive authentication on the local computer. Multiple network authentications are followed by one of the other scenarios. For example, a user authenticates to an Internet service provider ISP , authenticates to a VPN, and then uses their user account credentials to log on locally.

Cached credentials are disabled, and a Remote Access Services connection through VPN is required before local logon to authenticate the user. A domain user does not have a local account set up on a domain-joined computer and must establish a Remote Access Services connection through VPN connection before completing interactive logon.

Network authentication and computer logon are handled by the same credential provider. In this scenario, the user is required to connect to the network before logging on to the computer. For those operating systems designated in the Applies to list at the beginning of this topic. The credential provider enumerates the tiles for workstation logon.

The credential provider typically serializes credentials for authentication to the local security authority. This process displays tiles specific for each user and specific to each user's target systems. The logon and authentication architecture lets a user use tiles enumerated by the credential provider to unlock a workstation. Typically, the currently logged-on user is the default tile, but if more than one user is logged on, numerous tiles are displayed.

The credential provider enumerates tiles in response to a user request to change their password or other private information, such as a PIN. Typically, the currently logged-on user is the default tile; however, if more than one user is logged on, numerous tiles are displayed. The credential provider enumerates tiles based on the serialized credentials to be used for authentication on remote computers.

Therefore, state information cannot be maintained in the provider between instances of Credential UI. This structure results in one tile for each remote computer logon, assuming the credentials have been correctly serialized. This scenario is also used in User Account Control UAC , which can help prevent unauthorized changes to a computer by prompting the user for permission or an administrator password before permitting actions that could potentially affect the computer's operation or that could change settings that affect other users of the computer.

The following diagram shows the credential process for the operating systems designated in the Applies To list at the beginning of this topic.

Windows authentication is designed to manage credentials for applications or services that do not require user interaction.

Applications in user mode are limited in terms of what system resources they have access to, while services can have unrestricted access to the system memory and external devices. System services and transport-level applications access an Security Support Provider SSP through the Security Support Provider Interface SSPI in Windows, which provides functions for enumerating the security packages available on a system, selecting a package, and using that package to obtain an authenticated connection.

After the connection has been authenticated, the LSA on the server uses information from the client to build the security context, which contains an access token. The server can then call the SSPI function ImpersonateSecurityContext to attach the access token to an impersonation thread for the service. The integral system manages operating system'specific functions on behalf of the environment system and consists of a security system process the LSA , a workstation service, and a server service.

The security system process deals with security tokens, grants or denies permissions to access user accounts based on resource permissions, handles logon requests and initiates logon authentication, and determines which system resources the operating system needs to audit.

SSPI is available through the Secur It provides an abstraction layer between application-level protocols and security protocols. Because different applications require different ways of identifying or authenticating users and different ways of encrypting data as it travels across a network, SSPI provides a way to access dynamic-link libraries DLLs that contain different authentication and cryptographic functions.

Managed service accounts and virtual accounts were introduced in Windows Server R2 and Windows 7 to provide crucial applications, such as Microsoft SQL Server and Internet Information Services IIS , with the isolation of their own domain accounts, while eliminating the need for an administrator to manually administer the service principal name SPN and credentials for these accounts.

Even though most Windows applications run in the security context of the user who starts them, this is not true of services. Many Windows services, such as network and printing services, are started by the service controller when the user starts the computer. These services might run as Local Service or Local System and might continue to run after the last human user logs off. Windows Server R2 introduced services that run under a managed service account, which are domain principals.

Before starting a service, the service controller logs on by using the account that is designated for the service, and then presents the service's credentials for authentication by the LSA. The Windows service implements a programmatic interface that the service controller manager can use to control the service.

A Windows service can be started automatically when the system is started or manually with a service control program. For example, when a Windows client computer joins a domain, the messenger service on the computer connects to a domain controller and opens a secure channel to it.

To obtain an authenticated connection, the service must have credentials that the remote computer's Local Security Authority LSA trusts. When communicating with other computers in the network, LSA uses the credentials for the local computer's domain account, as do all other services running in the security context of the Local System and Network Service.

The file Ksecdd. Kernel mode has full access to the hardware and system resources of the computer. The kernel mode stops user-mode services and applications from accessing critical areas of the operating system that they should not have access to. The Local Security Authority LSA is a protected system process that authenticates and logs users on to the local computer. In addition, LSA maintains information about all aspects of local security on a computer these aspects are collectively known as the local security policy , and it provides various services for translation between names and security identifiers SIDs.

It's not the most easiest method to think of, but it's fairly easy to implement. Good luck! Well, what I've described is the easiest to implement. Another option is to have the user authenticate from within the client, and have the client request the server if the account has been linked to a webaccount yet. If it hasn't been linked, you can generate a URL with something like a token that opens, and redirects the user to Live ID.

After the user logs in on Web Auth, he is redirected to your website, along with the token you supplied context-parameter. Your website receives the token, in which the context is placed. What you'll have to do then is decrypt and parse the context to link the two together. So, in short: User signs in to application Application checks with server if user has been authenticated Yes: do nothing No?

Generate token, pseudocode: Code Snippet. Monday, February 11, PM. Hi Alex, Thanks for your solution. Regards, Probeer. Thursday, February 28, PM. How do I get the Live ID? I can't. And I gave up. Cheers Heng. Wednesday, July 16, PM. You are fast, Jorgen Ontopic: the only way to get a user name is by asking the user for it. For Web application i am using WebAuth. Kong 0. Thursday, March 6, AM.

Thursday, March 6, PM. What you suggested is one possibility, another one is this: - A user signs in, his U is checked.

Like emailaddress, or name? Wednesday, March 12, PM. So, does that mean it's not even possible in Web Authentication, no matter what kind of security rights I may have? Just want to make sure it just not something a normal application would have, but say a MS Partner Program application could have if such security level even exist in Web Authentication?

Thursday, March 13, AM. Thursday, March 13, PM. Thursday, April 17, PM. Saturday, April 19, PM. Sunday, April 20, PM. Monday, April 21, PM. Unfortunately it only shows their login id email address.

Hi Friens, I am using web authentication in my application which is provided by Windows Live and want to ask about the Field used while registring Application "Domain Name". My questions: 1 Where this Domain name Field used? A I registred my application with Domain Name field as "www. B Is Windows live allow only user with this extension.

Wednesday, April 23, AM. Hi, thanx for u r reply MVP. Friday, April 25, AM. Friday, April 25, PM. Problem statement : a I am using windows live "web" authentication mechanism in my web site. Monday, April 28, AM. But there is no easy other way of doing this, unfortunately.

Monday, April 28, PM. From what I gather after reading all the messages on this Forum, the solution I can think of is: 1 Authenticate the user using Windows Live 2 Get the UUID and check agaist your local database and it it's not found, display a Form on your page where the user can enter UserName, Email etc. I'd for my application make only the UserName as a required field.

Authentication is still maintained through Windows Live. Saturday, May 3, PM. That is indeed the preferred way of doing things.

Sunday, May 4, PM. Alex Media wrote: A user has to confirm that he wants to sign in to each Web Auth-application he visits. Monday, May 5, PM. Wednesday, July 16, AM.

As far as I know, it's perfectly legal to use the Contacts API or the Messenger Library for this purpose, the end user experience is confusing though, the user has to give his consent to a site to read his contacts list, while it's only used to fetch his e-mail address. Unfortunately, it's all we have right now. Alex Media wrote: As far as I know, it's perfectly legal to use the Contacts API or the Messenger Library for this purpose, the end user experience is confusing though, the user has to give his consent to a site to read his contacts list, while it's only used to fetch his e-mail address.

Alex Media wrote: Unfortunately, it's all we have right now. I didn't implement it with the Happy Purple Frog Social Network , because I assume a member of such websites has already given his e-mail address to the website, b ut if it wouldn't be allowed or would be deprecated, I wouldn't expect Microsoft to even give the node in the XML. If your site is configured to require registration approval or double opt-in , first-time users who attempt to sign in with their Live ID will be redirected to the standard sign-in page without any further information, which may lead to confusion.

This issue can be avoided by creating a Required user data page where users must enter an email address for their account. When this is done, users will receive a notification email about the status of their account. For detailed information, see Registering your application to use Microsoft accounts. Add a comment. Active Oldest Votes. It looks like link provided is to an implementation that will soon be obsolete.

John Ruf John Ruf 10 10 bronze badges. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown.



0コメント

  • 1000 / 1000