Augmenting security with a claims-based architecture
The claims-based architecture can be used to augment your existing security implementation. A common approach will be to create a token service that verifies the consumer identity and creates a signed token including the claims necessary for accessing a resource from a service, living within or outside the security boundaries of the consumer.
The following diagram illustrates this scenario:
The previous recipe showed us the steps to create
SamlSecurityToken. In this recipe, we will create a claims service that accepts the client credentials and returns signed
SamlSecurityToken using the group-level ...