Fact-checked by Grok 2 weeks ago

WS-Federation

WS-Federation is an standard specification that defines mechanisms for federating security realms to enable authorized access to resources managed in one realm by entities in another, through the brokering of , attribute, , and assertions while preserving the of federated claims. Version 1.2 of the specification, approved as an Standard in May 2009, builds upon foundational Web services protocols including for message-level security, WS-Trust for security token issuance and validation, and WS-Policy for expressing communication requirements. At its core, WS-Federation facilitates the establishment of trust relationships between security realms—distinct units of security administration or trust domains—forming a where realms act as producers or consumers of identity and authorization data. It supports two primary requestor profiles: passive requestors, such as web browsers that use HTTP redirects and form posts to interact with services, and active requestors, which are SOAP-based applications that directly exchange messages with web services. Central to this framework is the (STS), a runtime component that issues, renews, and validates security tokens to enable (SSO) and cross-realm without requiring users to re-authenticate. The protocol uses XML, , and WSDL extensibility models to integrate seamlessly with other WS-* specifications, allowing for flexible topologies such as direct trust, brokered trust, and sign-out propagation across federated environments. By extending WS-Trust's token exchange mechanisms to HTTP contexts, WS-Federation addresses scenarios involving diverse token types and trust relationships, making it a key enabler for enterprise identity federation in web services architectures. Although originating in the mid-2000s as part of the broader WS-* family developed by industry consortia including , , and others, it remains relevant for legacy and hybrid systems supporting management.

Overview

Definition and Scope

WS-Federation, or Web Services Federation, is an standard specification that defines mechanisms to enable , , attribute, and across different in web services environments. Version 1.2 of the specification was approved as an OASIS Standard on May 1, 2009. It allows authorized access to resources managed in one realm to be granted based on identities and attributes from another realm, using extensible models based on XML, , and WSDL. This protocol supports the brokering of tokens that encapsulate claims about a principal, facilitating secure without requiring a complete standalone solution. The scope of WS-Federation is primarily targeted at enterprise scenarios involving SOAP-based web services, where it establishes trust relationships between identity providers and service providers. It enables single sign-on and attribute exchange by allowing service providers to delegate authentication to trusted identity providers, avoiding the need for direct user authentication at each provider. The protocol accommodates various token formats, trust topologies, and infrastructures, including both active requestors (such as SOAP-based applications) and passive requestors (such as web browsers via HTTP redirects). Central to WS-Federation's model are key concepts including the (STS), which is a that issues, renews, and validates tokens containing claims based on verified evidence or assertions from trusted sources. The (RP) refers to a or service that relies on these tokens issued by an STS for access decisions and . The home realm (HR) denotes the domain or trust realm where a user's identity is managed, typically hosting the STS that authenticates the user and issues tokens on their behalf. WS-Federation builds on WS-Trust for the issuance and validation of these tokens.

Purpose and Key Benefits

WS-Federation primarily aims to enable the federation of identity, attribute, authentication, and authorization information across different security realms, allowing secure access to resources in one domain for users authenticated in another without requiring direct credential sharing. By defining mechanisms for token issuance, exchange, and validation, it facilitates single sign-on (SSO) in distributed systems, where a user authenticates once with a trusted identity provider and gains access to multiple services across trust boundaries. This addresses key identity management challenges in enterprise environments by supporting secure token delegation and attribute-based authorization, thereby reducing redundant authentication prompts and enhancing user experience in federated setups. A core benefit of WS-Federation is its emphasis on security through token-based trust models, where security tokens—such as those issued by a (STS)—carry claims about the user without exposing underlying credentials, minimizing risks associated with credential propagation across domains. This approach promotes scalability for large-scale web services by enabling efficient handling of authentication in heterogeneous infrastructures, supporting both active clients (e.g., applications) and passive clients (e.g., web browsers) via distinct federation profiles. Interoperability is another key advantage, as it builds on established WS-* standards to allow seamless integration across diverse platforms and vendors, fostering broader adoption in enterprise scenarios. Additionally, WS-Federation enhances and flexibility by incorporating pseudonymity through pseudonymous identifiers and just-in-time provisioning of user attributes, ensuring that only necessary information is disclosed during while complying with constraints. These features enable authenticated but interactions, protecting user identities in scenarios where full is unnecessary, and support dynamic brokering to adapt to varying security requirements across realms. Overall, it provides a robust framework for reducing administrative overhead in while maintaining high levels of security and compliance in distributed applications.

History

Initial Development

WS-Federation originated as a collaborative effort initiated in July 2003 by major technology companies to establish standardized mechanisms for identity federation within web services environments. The specification, titled Web Services Federation Language (WS-Federation) Version 1.0, was published on July 8, 2003, primarily authored by representatives from , , , , and , including editors Chris Kaler from and Anthony Nadalin from . This joint initiative built directly on the foundational specification, which had been released earlier in 2002, to extend secure messaging capabilities into broader federation scenarios for authentication and authorization across disparate trust realms. The primary motivations stemmed from the rapid growth of web services adoption in enterprise settings, particularly SOAP-based applications, where proprietary single sign-on (SSO) solutions like Microsoft's Passport highlighted the need for open, interoperable standards to enable secure cross-domain identity sharing without centralized control. These early developers aimed to reduce identity management costs, streamline user experiences through seamless SSO, and enhance security for inter-enterprise communications by allowing organizations to federate identity, authentication, and authorization data while supporting privacy features like pseudonyms and optional local identities. By addressing gaps in existing protocols, WS-Federation sought to broker trust relationships and facilitate security token exchanges in a modular manner compatible with XML, SOAP, and WSDL extensibility models. Key early milestones included the release of the initial draft specification in 2003, which outlined both active and passive requestor profiles to support diverse client types, from services to web browsers via HTTP. A notable demonstration of interoperability occurred in September 2003, when CEO and Senior Vice President Steve Mills showcased WS-Federation's capabilities in a cross-vendor scenario at an event in . This work laid the groundwork for incorporating concepts, later refined in related standards like WS-Trust in 2005, to handle token issuance and validation more robustly. The specification's development as part of the broader - web services security roadmap underscored its role in transitioning from proprietary federation approaches to industry-wide standards.

Standardization and Versions

WS-Federation was submitted to the Organization for the Advancement of Structured Information Standards (OASIS) in late 2006 as version 1.1, with the OASIS Web Services Federation (WSFED) Technical Committee formed in 2007 to advance it toward standardization. The specification progressed through committee drafts, culminating in approval as an OASIS Standard in May 2009, establishing WS-Federation version 1.2 as the current and most mature iteration. No subsequent major versions have been released by OASIS, reflecting the protocol's stability and widespread adoption in enterprise identity federation scenarios. The version history of WS-Federation began with version 1.0, an initial draft released in July 2003 by , , , , and , which focused on foundational mechanisms for , , and across trust realms using Web services protocols. Version 1.1 followed in December 2006, published by , , CA Inc., , Layer 7 Technologies, , , and , enhancing the passive requestor profile to enable browser-based (SSO) via HTTP redirects and POST bindings. Version 1.2, approved as the OASIS Standard in May 2009 by the WSFED Technical Committee, built upon these foundations with enhancements for broader interoperability. Key changes across versions emphasized incremental improvements in usability and security. In version 1.1, sign-in and sign-out mechanisms were introduced through the passive requestor profile, allowing web browsers to federate identity without SOAP messaging by using HTTP parameters like wa=wsignin1.0 for token requests and wa=wsignout1.0 for logout propagation across realms. Version 1.2 refined these capabilities with enhanced security token exchange protocols, support for compound tokens that combine multiple token types (such as SAML assertions), and tighter integration with WS-Trust version 1.3 for token issuance and validation. It also added refinements for attribute queries via dedicated Attribute Services and pseudonym handling through Pseudonym Services to improve privacy and selective disclosure in federated environments. These updates have not been significantly altered since 2009, as the specification has achieved sufficient maturity for ongoing implementations.

Technical Architecture

Core Components

WS-Federation relies on a set of core roles and entities to facilitate secure identity federation across different security realms. The (IdP), also referred to as an IP, serves as the entity responsible for authenticating end users (principals) and issuing security tokens that assert their identity and attributes. The (RP) is the service or application that consumes these tokens to authorize access for the authenticated principals, relying on the IdP's assertions without performing its own authentication. At the heart of this model is the (STS), a that issues, validates, and manages security tokens on behalf of the IdP, often extending its functionality to handle token lifecycle operations. To enable seamless interactions, WS-Federation incorporates Home Realm Discovery, a mechanism that identifies and routes requests to the appropriate IdP for a given principal, typically through user input, cookies, or a dedicated discovery service. Supporting this are key message types defined in conjunction with WS-Trust: the Request Security Token (RST) message, used by RPs or intermediaries to solicit tokens from an STS, and the Request Security Token Response (RSTR) message, which delivers the issued token along with any associated proofs or metadata. Token types are flexible and integrate with WS-Trust standards, commonly including SAML assertions for identity claims and X.509 certificates for cryptographic proofs, allowing RPs to specify preferred formats in requests. The model in WS-Federation is established through relationships between realms, supporting both bilateral trusts—direct agreements between an and —and brokered trusts, where intermediaries facilitate token across multiple parties. and establishment occur via , using WS-Federation documents that describe endpoints, supported token types, and signing keys to ensure and . These components collectively enable the federation process by providing the foundational structure for token-based and authorization.

Federation Process

The federation process in WS-Federation enables secure identity delegation and across disparate by facilitating the exchange and validation of between relying parties (s) and identity providers (IdPs). When a user attempts to access a protected resource at an RP, if no valid or session is present, the RP redirects the user's to the IdP's sign-in using an HTTP GET or request that includes the action wa=wsignin1.0 to indicate a federation sign-in operation. The request also specifies parameters such as wreply for the return URL to the RP and wtrealm to denote the target , allowing the IdP's () to authenticate the user—typically via local credentials or federated means—and issue a signed encapsulating the user's identity and attributes. Upon successful authentication, the redirects the user back to the RP with the token embedded in the response (via wresult), where the RP validates the token's and claims against its trusted configuration before granting access. WS-Federation supports two primary profiles for this token exchange process, tailored to different client types. The Passive Requestor Profile is designed for web browser-based interactions, leveraging HTTP redirects and form posts to transport WS-Trust-derived messages without requiring client-side SOAP support; it initiates the flow through the RP's discovery of the appropriate IdP and culminates in token delivery via browser redirection, enabling seamless single sign-on for passive clients. In contrast, the Active Requestor Profile accommodates rich clients or services capable of direct SOAP communication, where the requestor issues a WS-Trust RequestSecurityToken (RST) message to the STS for token issuance or exchange, followed by validation at the RP through a similar STS inquiry, supporting scenarios like brokered authentication in enterprise applications. The sign-out process ensures coordinated logout across federated realms to invalidate sessions and tokens. It begins when the user accesses a sign-out URL at the or , triggering a redirect to the IdP's with the wa=wsignout1.0 to signal a sign-out; the IdP's then propagates the logout notification—via a one-way SignOut message including the user's sign-out basis (e.g., a session identifier)—to trusted RPs and other IdPs in parallel, prompting each to clear local session state and tokens. A subsequent cleanup phase, invoked via wa=wsignoutcleanup1.0, confirms the logout and handles any residual artifacts, though the process is treated as a best-effort hint due to its unreliable, nature. Error handling in the federation process relies on standardized fault mechanisms to address issues like token invalidity or trust failures without disrupting the overall flow. For instance, if a token is expired or lacks required claims, the or returns a WS-Trust fault such as fed:NeedFresherCredentials, prompting the client to re-authenticate; similarly, trust mismatches trigger faults with codes like fed:SpecificMetadata to indicate missing security details, allowing the requestor to resubmit with additional context. These faults are embedded in responses or HTTP error pages, ensuring while minimizing exposure of sensitive information.

Specifications

Protocol Mechanics

WS-Federation operates through a set of defined message exchanges that facilitate identity across security realms, primarily using HTTP-based parameters for web scenarios and for more structured interactions. The core sign-in request is initiated via an HTTP GET or to the (STS) endpoint, employing specific parameters to convey the action and context. The required parameter wa specifies the action as wsignin1.0 for sign-in operations, while wtrealm identifies the URI of the (RP) realm requesting the . An optional wctx parameter carries an opaque context value from the RP, which the STS echoes back in the response to maintain session continuity. Upon successful authentication, the STS responds with an HTTP redirect or direct containing the wresult parameter, which encapsulates the security token in a signed XML structure, typically a WS-Trust RequestSecurityTokenResponse element. This token includes claims about the authenticated principal and is formatted to be processed by the . For token exchange scenarios, WS-Federation integrates directly with WS-Trust 1.3 mechanisms, where a RequestSecurityToken (RST) message requests issuance or exchange of tokens, and the response is a RequestSecurityTokenResponse (RSTR). These messages support various token types and lifetimes, enabling the delegation of authentication across realms without direct credential sharing. Token confirmation in WS-Federation leverages WS-Trust 1.3's methods to bind the token to the presenter securely. The bearer confirmation method treats the token as valid upon simple presentation, relying on transport without proof-of-possession, identified by the URI http://docs.oasis-open.org/ws-sx/ws-trust/200512/Bearer. Holder-of- confirmation requires the presenter to demonstrate possession of a key associated with the token, often via an encrypted key or , using URIs like http://docs.oasis-open.org/ws-sx/ws-trust/200512/SymmetricKey or public key variants for enhanced . Sender-vouches confirmation allows a third party to vouch for the token's holder, typically through an OnBehalfOf element in the RST, without direct proof from the end user. Endpoints and capabilities in WS-Federation are advertised through XML metadata documents, conforming to WS-Policy and WS-MetadataExchange patterns. For passive requestors, such as web browsers, the metadata includes elements like <wsfed:PassiveRequestorEndpoint>, which specifies the for sign-in requests, often wrapped in <fed:PassiveRequestorEndpoints> with an <wsa:Address> . This allows relying parties to federation partners dynamically without hard-coded configurations. Security in the protocol mandates XML digital signatures on all tokens and responses using elements from , such as <ds:Signature>, to ensure integrity and authenticity. Encryption of token content is optional but recommended for sensitive claims, applied via XML Encryption standards. Messages bind to HTTP transports for browser-based flows (e.g., via 302 redirects or form posts) or for programmatic access, with TLS required for confidentiality in both cases. WS-Federation relies on WS-Trust 1.3 as a core dependency for token issuance and validation through interactions with a (STS), utilizing operations such as and Validate to facilitate secure token exchanges in federated environments. This integration extends WS-Trust 1.3's Request Security Token (RST) and Request Security Token Response (RSTR) messages to include support for pseudonyms and attributes, enabling WS-Federation's passive and active profiles where passive requestors use HTTP redirects and active ones employ SOAP-based communications. WS-Security provides the foundational message-level security for WS-Federation, incorporating mechanisms like XML signatures and to protect federation messages and tokens during transit. Complementing this, WS-SecureConversation integrates to manage session security tokens, allowing for the establishment and maintenance of secure, stateful sessions across different security realms in federated scenarios. Further integrations include WS-MetadataExchange, which supports the discovery of federation endpoints through Metadata Endpoint References (MEPRs) and elements like <mex:MetadataSection>, streamlining the configuration of trust relationships. WS-Policy enables the expression of security requirements, such as claim types and applicable policies for attribute and services, with compatibility for WS-Policy versions 1.2 and 1.5 to assert federation metadata. WS-Federation 1.2 is based on WS-Trust 1.3. These standards collectively enable mechanics like token exchange by providing the necessary and discovery frameworks.

Implementations and Adoption

Major Software Implementations

(ADFS), Microsoft's primary implementation of WS-Federation, has served as a key (IdP) and (RP) since its introduction in , supporting version 1.2 with both passive and active request profiles for federated (SSO). ADFS integrates seamlessly with and extends to hybrid cloud environments through Azure (Azure AD), enabling secure token exchange across domains. In ADFS versions from 2019 onward, enhancements include improved support for hybrid deployments, maintaining compatibility with WS-Federation while incorporating modern protocols. IBM Security Verify Access (formerly IBM Security Federated Identity Manager and Tivoli Federated Identity Manager) provides robust WS-Federation support for establishing trust relationships and token brokering in environments, configurable via its Passive Profile for SSO federations. As of version 10.0.9 (January 2025), it continues to handle WS-Federation alongside other standards like WS-Trust, facilitating identity mapping and secure access across disparate systems. WSO2 Identity Server implements WS-Federation through its Passive Security Token Service (STS), which issues tokens for and supports federation as both and in Java-based deployments. As of version 7.2.0 (2025), this open-source solution emphasizes interoperability, allowing configuration of WS-Federation connections for web applications and integration with ecosystems. In the Microsoft .NET ecosystem, Windows Identity Foundation (WIF) and its successors in provide framework-level support for handling WS-Federation tokens, enabling passive in claims-based applications. For Java environments, libraries like OpenSAML incorporate WS-Federation extensions for parsing and validating tokens, often used in custom implementations alongside SAML support. As of 2025, WS-Federation remains in use within legacy enterprise systems, particularly those reliant on ADFS, though adoption has declined in favor of protocols like OAuth 2.0 and Connect for new deployments.

Real-World Use Cases

WS-Federation facilitates enterprise (SSO) by enabling federated access to internal applications across corporate boundaries, allowing employees to authenticate once and access partner portals without re-authentication. For instance, organizations use it to provide seamless for internal to external systems, reducing administrative overhead and improving productivity. In cloud-hybrid scenarios, WS-Federation integrates on-premises (ADFS) with providers to secure access in SOAP-based services, such as extending from local networks to Azure-hosted workloads. This setup supports hybrid applications where parts run on-premises and others in the cloud, ensuring consistent without full migration. For B2B federation, WS-Federation enables partners to share attributes for just-in-time in web services, allowing secure without creating separate user accounts. Examples include direct federation between Microsoft Entra tenants and external organizations using ADFS as the for B2B scenarios. WS-Federation aids legacy migration by bridging older WS-* systems to modern providers, maintaining token-based trust in environments like or web services while transitioning to cloud-native solutions. In practice, WS-Federation is best suited for environments due to its protocol overhead, making it less common for RESTful APIs where lighter alternatives prevail.

Comparisons

With SAML

WS-Federation and SAML share the goal of enabling across trust domains but differ fundamentally in design. WS-Federation leverages parameters, such as wa=wsignin1.0 for the action and wtrealm for the target , to facilitate redirects, while relying on WS-Trust for issuing tokens that often encapsulate SAML assertions. In contrast, SAML employs standalone XML assertions exchanged through HTTP bindings like or Redirect, using Base64-encoded SAMLRequest parameters alongside RelayState to preserve context during browser-based flows. This makes WS-Federation more aligned with web services architectures, whereas SAML prioritizes browser-mediated for web applications. In terms of usage, WS-Federation is tailored for Microsoft-centric enterprise environments, particularly those involving SOAP-based web services and tools like Active Directory Federation Services (ADFS), making it a natural fit for integrating with Azure and SharePoint. SAML, however, functions as a vendor-agnostic protocol for cross-domain web SSO, supporting a wider array of identity providers and service providers beyond Microsoft ecosystems. WS-Federation's integration with WS-Trust enables flexible claim-based authentication in service-oriented setups. WS-Federation's strengths lie in its simplicity for .NET developers, enabling straightforward implementation within stacks, though this comes at the cost of reduced outside those boundaries. SAML, while more verbose due to its XML structure, excels in non-Microsoft settings, achieving higher adoption in sectors like through federations such as InCommon, where it supports seamless access across academic institutions. Regarding , both can transport SAML tokens—such as SAML 1.1 or 2.0 assertions—facilitating hybrid scenarios, but WS-Federation's follows WS-MetadataExchange specifics, differing from SAML's standardized entity descriptors.

With OAuth and OpenID Connect

WS-Federation primarily facilitates authentication through security tokens exchanged in SOAP-based web services environments, targeting enterprise federation scenarios where identity providers issue SAML assertions for server-to-server trust. In contrast, 2.0 serves as an authorization framework for delegating access to protected resources via RESTful s, without directly handling authentication, while extends 2.0 by adding an authentication layer using JSON Web Tokens (JWTs) to convey user identity information. These distinctions arise from their foundational designs: WS-Federation integrates with the WS-* family of standards for XML-centric, message-based security in legacy enterprise systems, whereas 2.0 and emphasize lightweight, HTTP-based flows suitable for API ecosystems. WS-Federation excels in server-to-server federation within established enterprise infrastructures, such as those using (ADFS), but it is less ideal for client-side applications due to its reliance on passive profiles for browser interactions. OAuth 2.0 and Connect, however, are preferred for mobile and web applications, offering client-side flows like authorization codes and implicit grants that support diverse devices and native integrations in cloud platforms such as and . This applicability stems from OAuth/OIDC's JSON-based simplicity, enabling seamless delegation in API-driven architectures, while WS-Federation's XML overhead limits its use in resource-constrained or modern distributed systems. Security models differ notably: WS-Federation employs XML-based tokens with digital and optional , inheriting the XML that includes risks like signature wrapping, whereas 2.0 and OpenID Connect utilize and JWT formats with JSON Web Signatures for compactness and easier , though they require careful implementation to mitigate OAuth-specific vulnerabilities such as token leakage. Adoption trends as of 2025 show and OpenID Connect dominating new deployments in enterprise settings, with approximately 71% of enterprises adopting them for integrations due to their alignment with cloud-native paradigms, while WS-Federation persists mainly in legacy ecosystems with limited broader support. OpenID Connect addresses some of WS-Federation's limitations in browser-based flows through standardized discovery and JWTs but lacks native ties to the WS-* ecosystem. Migration from WS-Federation to Connect often involves hybrid approaches, such as configuring OWIN middleware in applications to support both protocols during transition, replacing WS-Federation sign-in handlers with Connect authentication while updating endpoints to use documents for issuer discovery. In ADFS environments, this can include running modern identity servers alongside legacy setups, redirecting new applications to 2.0/OIDC flows backed by , and retaining SAML tokens for applications unable to migrate immediately to ensure continuity in federated .

References

  1. [1]
    ws-federation-1.2-spec-os.html - Index of /
    This specification defines mechanisms to allow different security realms to federate, such that authorized access to resources managed in one realm can be ...
  2. [2]
    Web Services Federation Language (WS-Federation) v1.2
    By using the XML, SOAP and WSDL extensibility models, the WS-* specifications are designed to be composed with each other to provide a rich Web services ...
  3. [3]
    [MS-ADFSOD]: WS-Federation - Microsoft Learn
    Oct 30, 2024 · WS-Federation provides the general language and mechanism to connect users and resources across security boundaries, typically in disparate security realms.
  4. [4]
    [PDF] Understanding WS-Federation - http - IBM
    May 28, 2007 · This paper is intended to help the reader understand the features of WS-Federation by describing the use of the specification in selected ...
  5. [5]
    [PDF] Web Services Federation Language (WS - xmlsoap.org
    Jul 8, 2003 · [WS-FederationActive]. "Web Services Federation Language: Active Requestor Profile", BEA, IBM,. Microsoft, RSA Security, VeriSign, July 2003.
  6. [6]
    [PDF] Federated Identity Management and Web Services Security
    within the scope of the IBM-Microsoft Web services security roadmap. WS-Federation was published on July 8, 2003. WS-Federation interoperability between IBM ...
  7. [7]
    OASIS Web Services Federation (WSFED) TC
    The TC will accept as input the December 2006 Version 1.1 of the WS-Federation specification [1] (the Input document) as published by BEA Systems Inc., BMC ...
  8. [8]
    [PDF] Web Services Federation Language (WS - xmlsoap.org
    Dec 1, 2006 · WS-. Federation is a building block that is used in conjunction with other Web service, transport, and application-specific protocols to ...
  9. [9]
    WS-Trust 1.4 - OASIS Open
    Signed Security Token – A signed security token is a security token that is cryptographically endorsed by a specific authority (e.g. an X.509 certificate or a ...
  10. [10]
    Active Directory Federation Services Overview | Microsoft Learn
    Apr 8, 2025 · Active Directory Federation Service (AD FS) enables Federated Identity and Access Management by securely sharing digital identity and entitlements rights.AD FS Requirements · AD FS OpenID Connect/OAuth... · AD FS DecommissionMissing: WS- major implementations
  11. [11]
    Developer's Introduction To Active Directory Federation Services
    ADFS is built on standards like WS-Federation, which was coauthored by Microsoft, IBM, Verisign, BEA, and RSA Security. Different organizations often run very ...Missing: major | Show results with:major
  12. [12]
    Planning a WS-Federation single sign-on federation - IBM
    When you configure Tivoli® Federated Identity Manager, select the WS-Federation Passive Profile. You should be familiar with the WS-Federation standards ...
  13. [13]
    WS-Federation federations - IBM
    WS-Federation is a protocol that you can use to accomplish federated single sign-on from identity providers to service providers.<|separator|>
  14. [14]
    Configuring WS-Federation - WSO2 Identity Server Documentation
    WS-Federation (Web Services Federation) describes the management and brokering of trust relationships and security token exchange across Web services and ...
  15. [15]
    Add login with WS-Federation - WSO2 Identity Server documentation
    Follow this guide to register a WS-Federation connection and add it to the login flow of your application.
  16. [16]
    Authenticate users with WS-Federation in ASP.NET Core
    Jun 24, 2025 · This tutorial demonstrates how to enable users to sign in with a WS-Federation authentication provider like Active Directory Federation Services (ADFS) or ...
  17. [17]
    Package org.opensaml.soap.wsfed
    This interface defines how the object representing a WS RSTR RequestedSecurityTokenResponse element behaves. WSFedConstants. WS-Federation Constants.
  18. [18]
    Understanding WS-Federation: A modern primer for an obsolete ...
    Apr 9, 2024 · In this article, you will learn the basics of how the WS-Federation works, what the various protocol messages look like, and some of its security limitations.
  19. [19]
    Extend On-Premises Active Directory Federation Services to Azure
    Potential use cases. Typical uses for this architecture include: Hybrid applications where workloads run partly on-premises and partly in Azure. Solutions ...Missing: WS- | Show results with:WS-
  20. [20]
    Add a SAML/WS-Fed identity provider - Microsoft Entra External ID
    May 7, 2025 · Your Microsoft Entra tenant can be directly federated with external organizations that use a SAML or WS-Fed identity provider (IdP).Prerequisites · How to configure SAML/WS...
  21. [21]
    Migrating from Microsoft Active Directory Federation Services - Curity
    Some organizations use ADFS's support for WS-Federation, an alternative SAML-like standard, to secure websites.
  22. [22]
    Web Services Federation - Akamai TechDocs
    The WS-Federation protocol is the only identity federation protocol of choice for many legacy Microsoft applications such as Sharepoint. EAA only supports ...Missing: motivations | Show results with:motivations
  23. [23]
    ADFS Deep-Dive: Comparing WS-Fed, SAML, and OAuth
    Nov 2, 2014 · We're going to go a little deeper into WS-Fed, SAML, and OAuth which are the things that tie these disparate systems and applications together.Missing: interoperability | Show results with:interoperability
  24. [24]
    Interoperability between Heterogeneous Federation Architectures
    In this paper, we try to initiate an in-depth reflection on this issue, through the comparison of two main federation architecture specifications: SAML ( ...
  25. [25]
    [PDF] Simplifying Federated Access to Scholarly Content and Services
    May 13, 2020 · • The InCommon federation governs the policy framework and facilitates the exchange of SAML configuration details between all parties in a ...
  26. [26]
    What's the Difference Between OAuth, OpenID Connect, and SAML?
    Sep 2, 2024 · The main differentiator between these three players is that OAuth 2.0 is a framework that controls authorization to a protected resource such as ...
  27. [27]
    Understanding and Comparing Authentication Protocols| Identite
    Apr 14, 2022 · WS-Fed is arguably simpler than SAML for developers to implement, but its limited support among IdPs and SPs alike limit adoption. OAuth – is ...
  28. [28]
    Why is OAuth2/OpenID Connect considered less secure than SAML ...
    Jan 13, 2017 · The prevailing notion seems to be that OAuth2 and OpenID Connect are considered less secure than SAML/WS-Federation.Missing: higher education
  29. [29]
    Comparing IAM Protocols (SAML, OAuth, OIDC) For Enterprises.
    Sep 23, 2025 · According to a Gartner IAM report (2024), 78% of enterprises have adopted at least one of these protocols for web SSO or API access. Companies ...
  30. [30]
    How to Migrate from WS-Federation to OpenID Connect in ASP.NET ...
    May 22, 2025 · To migrate from WS-Federation to OpenID Connect (OIDC) in an ASP.NET Web Forms app (.NET Framework 4.8), use OWIN (Katana) middleware. Install ...Change MVC 4 site from Federated Identity to OpenID ConnectUse SAML/WS-Fed federation as an identity provider in External ...More results from learn.microsoft.com