Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the author
OK
Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities 1st Edition
Purchase options and add-ons
Windows CardSpace empowers organizations to prevent identity theft and systematically address a broad spectrum of security and privacy challenges. Understanding Windows CardSpaceis the first insiders guide to Windows CardSpace and the broader topic of identity management for technical and business professionals. Drawing on the authors unparalleled experience earned by working with the CardSpace product team and by implementing state-of-the-art CardSpace-based systems at leading enterprises, it offers unprecedented insight into the realities of identity management: from planning and design through deployment.
Part I introduces the fundamental concepts of user-centered identity management, explains the context in which Windows CardSpace operates, and reviews the problems CardSpace aims to solve. Next, the authors walk through CardSpace from a technical standpoint, describing its technologies, elements, artifacts, operations and development practices, and usage scenarios. Finally, they carefully review the design and business considerations associated with architecting solutions based on CardSpace or any other user-centered identity management
system. Coverage includes
- The limitations of current approaches to authentication and identity management
- Detailed information on advanced Web services
- The Identity Metasystem, the laws of identity, and the ideal authentication system
- Windows CardSpace: What it is, how it works, and how developers and managers can use it in their organizations
- CardSpace technology: user experience, Information Cards, private desktops, and integration with .NET 3.5 and Windows Vista
- CardSpace implementation: from HTML integration through federation, Web services integration, and beyond
- Adding personal card support to a website: a detailed, scenario-based explanation
- Choosing or becoming an identity provider: opportunities, business impacts, operational issues, and pitfalls to avoid
- Using CardSpace to leverage trust relationships and overcome phishing
Whether youre a developer, security specialist, or business decision-maker, this book will answer your most crucial questions about identity management, so you can protect everything that matters: your people, your assets, your partners, and your customers.
Foreword xv
Preface xviii
Part I Setting the Context
Chapter 1: The Problem 3
The Advent of Profitable Digital Crime 4
Passwords: Ascent and Decline 29
The Babel of Cryptography 36
The Babel of Web User Interfaces 79
Summary 84
Chapter 2: Hints Toward a Solution 87
A World Without a Center 89
The Seven Laws of Identity 92
The Identity Metasystem 110
Trust 1
- ISBN-100321496841
- ISBN-13978-0321496843
- Edition1st
- PublisherAddison-Wesley Professional
- Publication dateJanuary 1, 2008
- LanguageEnglish
- Dimensions7 x 1 x 9.25 inches
- Print length354 pages
Editorial Reviews
About the Author
Vittorio has more than 13 years of experience in the software industry. He worked in the fields of computational geometry, scientific visualization, usability, business data, and industrial applications and has published articles in international academic industry journals. Vittorio joined Microsoft Italy in 2001 in Consulting Services. Before falling hopelessly in love with identity, he worked with Web Services and Services Orientation from its very inception, becoming a reference and a trusted advisor for key industry players nationwide and at the European level. In October 2005, he answered the call of Microsoft headquarters and moved to Redmond, where he lives with his wife, Iwona. Vittorio holds a Masters degree in Computer Science from the Universita di Genova, Italy.
Garrett Serack worked as an independent software development consultant in Calgary, Canada, for 15 years, with clients in fields such as government, telecom, petroleum, and railways. Joining Microsoft in the fall of 2005 as the Community Program Manager of the Federated Identity team, Garrett has worked with the companies and the Open Source community to build digital identity frameworks, tools, and standards that are shaping the future of Internet commerce and strengthening the fight against fraud. In the summer of 2007, he transitioned to be the Community Lead in the Open Source Software Labs at Microsoft.
Garrett lives in Bothell, Washington, with his fantastic wife, Brandie, and their two amazing daughters Tea and Indyanna. Catch up on CardSpace and begin to learn more about Microsoft Open Source efforts on his blog at http://fearthecowboy.com.
Caleb Baker has been at Microsoft for the past seven years and is part of the Federated Identity team. In addition to building CardSpace, the team is working on the other pieces needed to build the Identity Metasystem. Caleb has been on the CardSpace product team since 2004 (InfoCard at the time). Since the first release of CardSpace, he has continued to work on future CardSpace products as well as various Identity Metasystem interoperability projects.
Before working on CardSpace, Caleb gained experience in the identity and security space by working on Active Directory and the Active Directory Migration Tool (ADMT). Caleb is a Seattle-area native, having graduated from the University of Washington with a degree in Physics and Political Science and has also earned a Masters degree in Computer Science.
Excerpt. © Reprinted by permission. All rights reserved.
Preface
In the past few years, identity has finally been receiving the attention it deservers.
With rampaging phishing and widespread cybercrime as the forcing functions, the industry as a whole is reacting with a concerted effort to understand what the best practices are and is getting there fast. We had the privilege of being among the first people concretely working on one of the key efforts of the identity renaissance: Windows CardSpace.
Windows CardSpace is an expression of the new user-centered approach to identity management. The new approach is poised to solve many different problems of diverse natures: There are technological considerations, such as offering better authentication mechanisms than passwords; usability considerations, such as guaranteeing that the user has a clear understanding of what is going on; and even social-science considerations about how we can effectively leverage trust relationships and make obvious to the common user the identity of the website being visited.
That is the reason why explaining Windows CardSpace in just a few words is so challenging. Depending on your background and your role, you will be interested in a different angle of the story. We experienced this fact countless times in the past two years: with customers and partners, at conferences, with the press, with colleagues from other groups, and even with spouses, trying to explain what was that super important thing that kept us in the office until late.
We believe that user-centered identity management has the potential to change for the better how everybody uses the Internet. We also believe that the best way of reaping its benefits is to develop a deep understanding of the approach, complemented by hands-on knowledge of supporting technologies such as Windows CardSpace. The book you are holding in your hands has the goal of helping you to gain such insights.
We live in exciting times. The entire industry is moving toward a common solution, with a true spirit of collaboration and strong will to do the right thing. The discussion is open to anybody who wants to participate. We hope that you will join us!
Book Structure, Content, and Audiences
Windows CardSpace is part of a comprehensive solution, the Identity Metasystem, which tries to provide a solution to many security-related bad practices and widespread problems. CardSpace is also a very flexible technology that can be successfully leveraged to address a wide range of different scenarios and business needs. Finally, Windows CardSpace enables new scenarios and radically new ways of dealing with known problems. Given the sheer breadth of the areas it touches, it comes as no surprise that people of all positions and backgrounds are interested in knowing more about it.
To address so many different aspects and such a diverse audience, we divided the book into three parts.
Part I: Setting the Context
The first part of this book introduces you to user-centered identity management, the model on which Windows CardSpace is based. This part lays the foundation for understanding the context in which CardSpace is meant to operate and the problems it has been designed to overcome. Architects, analysts, and even strictly nontechnical folks will get the most from this part. There are practically no assumptions of prior knowledge; the text introduces the necessary concepts and technologies as needed. Note that in the first part CardSpace is barely mentioned, because the focus is on the underlying models and considerations that are purely platform agnostic.
Chapter 1, "The Problem," explores the problems with identity management today. It explores how authentication technologies evolved to the current practices, showing the historical reasons for current widespread problems. The chapter introduces basic concepts such as Internet protocols, types of attacks, introductory cryptography, authentication technologies, and so on.
Chapter 2, "Hints Toward a Solution," presents the current thinking about what the ideal authentication system would look like. The seven laws of identity are described in great depth. The Identity Metasystem is introduced, and its compliance with the identity laws is explained in detail. This chapter also provides a basic introduction to advanced web services and highlights how the abstract concepts in the Identity Metasystem map to concrete features in the web services set of specifications.
By the end of Part I, you will have a comprehensive view of the situation: what the problems are we are wrestling with, why they are here, and how the Identity Metasystem can solve them. You will also understand the role of Windows CardSpace in the big picture.
Part II: The Technology
Part II focuses on Windows CardSpace from a technological standpoint. It describes the technology, the elements and artifacts it entails, the operations and development practices, and the most common usage scenarios. This part is for the developer or whoever wants to have hands-on experience with Windows CardSpace.
Chapter 3, "Windows CardSpace," introduces the technology. This includes the user experience, Information Cards and the different card types, the private desktop, and the canonical usage scenario.
Chapter 4, "CardSpace Implementation," describes the usage of CardSpace in the most common scenarios. From the HTML integration syntax to token manipulation, going though federation, integration with web services and CardSpace invocation via native APIs, this chapter covers all the basic development tasks.
Chapter 5, "Guidance for a Relying Party," presents a detailed example of a common scenario: enabling Personal Cards on an ASP.NET website.
Part III: Practical Considerations
The last part of this book is devoted to design and business considerations that come in handy when architecting a solution based on Windows CardSpace (or on user-centered identity management technologies in general). The chapters in this part will prove useful for architects and project managers. Business decision makers and IT managers will probably be interested in some of these considerations, too. Hints for developers are spread throughout the text.
Chapter 6, "Identity Consumers," presents some thoughts about deciding to be or to use an identity provider. It also looks at things from the viewpoint of being a relying party: for example, the main effects on your business and operations of accepting identities in form of tokens and from third parties, and the opportunities you want to take advantage of and the caveats you want to avoid.
Chapter 7, "Identity Providers," lists some considerations to keep in mind when becoming an identity provider.
Conventions
This book follows the conventions of the Independent Technology Guides series. Analysis sections appear in boxed sidebars and give you added perspective on the issues and technologies being discussed. Also, margin notes are included throughout the chapters summarizing or pointing out the most important points.
Product details
- Publisher : Addison-Wesley Professional; 1st edition (January 1, 2008)
- Language : English
- Paperback : 354 pages
- ISBN-10 : 0321496841
- ISBN-13 : 978-0321496843
- Item Weight : 1.58 pounds
- Dimensions : 7 x 1 x 9.25 inches
- Best Sellers Rank: #8,028,162 in Books (See Top 100 in Books)
- #5,479 in Privacy & Online Safety
- #17,133 in Internet & Telecommunications
- #37,269 in Internet & Social Media
- Customer Reviews:
Important information
To report an issue with this product or seller, click here.
About the author

Vittorio Bertocci is the Principal Architect for Auth0. Before Auth0, Vittorio had a lengthy career with Microsoft, where he worked with Fortune 100 and Global 100 companies, including working on Microsoft’s Azure Active Directory team as principal program manager focusing on the developer experience. He contributed to the inception and launch of Microsoft's claims-based platform components (Windows Identity Foundation and ADFS, ADAL and MSAL SDKs, ASP.NET middleware).
Vittorio blogs at www.cloudidentity.com and tweets as @VIBRONET
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
There is so much text devoted to reason why WS-* are the right tools for the requirements - but, the book fails to explain how cardspace itself uses them.
Chpater 4 - Cardspace implementation - covers just one leg - token validation. Where is the discussion of how a .crd is actually obtained, how the login credentials are sent to IP, how is the token actually given to cardspace, how is the metadata exchange used, etc.?
More specifically, the book must have covered how each of the legs of communication in Figure 2-7 maps to a cardspace implementation.
The book itself is an easy read. Not a tome by an means. Easy to pickup as a reference or to sit with and read chapter by chapter.
It succeeds at describing Identity Federation from a conceptual level as well as from a technical level (as it pertains to Cardspace). It even addresses some of the less obvious issues such as the notion of auditing and non-auditing IdPs.
Be warned, this book focuses on Cardspace fairly exclusively. There isn't a lot on interoperability here between things like OpenID and Cardspace for example. That's a topic for another book and could not easily be incorporated without devoting a lot of pages to OpenID.
The technical section is navigated through use cases that tackle things from an end-user experience as well as from the developer angle. This is effective as often it's hard to understand one without the other. At every point the reasoning behind the solution is presented also. This worked well.
For me personally, I wish they'd spent a little more time on things like GetToken() although using this directly will likely not be of interest to 90% of folks out there.
Unique to books of this type is a section devoted to Practical Considerations. Why one would want to setup an IdP or simply play the role of Identity Consumer for example. In today's environment the business value of establishing yourself as an IdP is questionable and I was glad to see this point addressed head on.
Vittorio, Garrett and Caleb have done an terrific job of describing and grounding one of the most compelling and abstract problems faced by the internet today. This an excellent book and for many will serve as a one-stop-shop for all your Cardspace questions.
Even if you are familiar with the scope of the problem, I encourage you to be patient with the first section of the book - it will add to your arsenal of context - which you will find useful when 'explaining' the business reasons for moving toward the CardSpace identity selector and the greater Identity 2.0 space (including Identity Providers and Relying Parties).
The identity problem is important, if you haven't taken a look at CardSpace, this book is very useful start for you. The book also gives useful context arount the greater Identity 2.0 space.

