Definition

claims-based identity

What is claims-based identity?

Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity's specific information while providing data that authorizes it for appropriate and relevant interactions.

This authentication method provides user information automatically, so applications do not need to request it of the user and the user doesn't have to provide that information separately for different applications.

Benefits of claims-based identity

Claims-based identity offers the following advantages when implementing authentication:

  • Outsourcing authentication. Claims-based identity removes the need for applications to perform authentication tasks, making account management easier by centralizing authentication. Applications are not responsible for user authentication, looking up the details of users' identities, storing user accounts and passwords, or integrating with other identity systems. Additionally, centralizing authentication makes it easier to upgrade applications to stronger authentication methods.
  • Supporting multiple authentication providers. Claims-based identity enables companies to easily implement different authentication methods using different providers, for example, a Microsoft account, Windows Active Directory (AD) authentication or forms-based authentication for a website. This is done using single sign-on (SSO) to support users who access web services or web applications over the internet, from within the organization or through affiliated organizations.
  • Supporting federation of identities. Claims-based identity enables external users in one organization to access the network applications of another company using their own identities.

Claims-based identity offers more versatility because organizations can create additional attributes as claims on which to base access control.

How claims-based identity works

Claims-based identity is one type of identity and access management (IAM), which is a framework for business processes that facilitates the management of digital identities. The framework includes the technology needed to support identity management.

Claims are pieces of information about a user that have been packaged, signed into security tokens and sent by an issuer or identity provider to relying party applications through a security token service (STS). The data is then transmitted using a standard method, such as Security Assertion Markup Language (SAML), so that the claims have the same format across multiple authentication sources and applications.

Claims-based identity has been incorporated into the Microsoft .NET Framework as part of the Windows Identity Foundation (WIF). WIF is a set of .NET Framework classes for implementing claims-based identity developed to simplify and unify this identity approach for client-server applications and Microsoft Azure cloud applications.

A security token service acts as an issuing authority, accepting incoming credentials, validating them and creating a secure token with the list of claims. The tokens are encrypted and sent to an application. It is important that the issuer of the token is a trusted entity, such as Microsoft, Facebook or Google.

Microsoft's AD Federation Services (AD FS) is a type of STS. AD FS is a feature of the Windows Server operating system that extends end users' SSO access to applications and systems outside the corporate firewall. AD FS uses a claims-based access control authorization model that involves authenticating users via cookies and SAML.

Claims-based identity process

Claims-based identity depends on trust relationships being established between those making the claims and any relying parties. A relying party is an application or device that relies on claims for user identity and access control. A relying party only accepts claims about a user's identity from a trusted issuer.

Claims are sent to relying parties in the form of security tokens in several formats, including Extensible Markup Language-based SAML or Simple Web Token. The STS processes token requests from relying parties.

The STS packages one or more claims into a security token, signs it cryptographically and sends it to a relying party encrypted on the wire. When a relying party receives the token, it verifies the token signature and, if it's valid, uses the claims for any other necessary decision-making, such as authorization checks or personalization.

The claims-based identity process is as follows:

  1. A user requests access to an application.
  2. The application sends a request to the STS for a token for that user.
  3. The STS authenticates the user, for example, with a password, biometric scan or smart card.
  4. The STS creates the token.
  5. The STS signs the token digitally and the digital signature is then part of the token.
  6. The STS sends the token back to the application that requested it.
  7. The application verifies the validity of the digital signature and confirms it came from an STS that the service or application trusts.
  8. The application processes the claims data to determine whether to allow the user to access the application, as well as the level of access the user will have.

The process can be more complicated, as there are two kinds of STS: Identity Provider STS and Relying Party STS. Identity Provider STS authentication relies on an authentication service, such as the one provided by AD. Relying Party STS authenticates using tokens that have been provided by a trusted Identity Provider STS.

Editor's note: The definition was written by Ivy Wigmore and Linda Rosencrance. TechTarget editors revised it in 2023 to improve the reader experience.

This was last updated in May 2023

Continue Reading About claims-based identity

Dig Deeper on Identity and access management

Networking
CIO
Enterprise Desktop
  • Understanding how GPOs and Intune interact

    Group Policy and Microsoft Intune are both mature device management technologies with enterprise use cases. IT should know how to...

  • Comparing MSI vs. MSIX

    While MSI was the preferred method for distributing enterprise applications for decades, the MSIX format promises to improve upon...

  • How to install MSIX and msixbundle

    IT admins should know that one of the simplest ways to deploy Windows applications across a fleet of managed desktops is with an ...

Cloud Computing
ComputerWeekly.com
Close