This documentation is archived and is not being maintained.
ACS How To's
Published: April 7, 2011
Updated: June 19, 2015
Applies To: Azure
The following How To topics are available for Microsoft Azure Active Directory Access Control (also known as Access Control Service or ACS):
-
How to: Add an Azure AD Tenant as an Identity Provider
-
How to: Add Portal Administrators
-
How to: Add Service Identities with an X.509 Certificate, Password, or Symmetric Key
-
How to: Create an Access Control Namespace
-
How to: Create My First Claims-Aware ASP.NET Application Using ACS
-
How to: Create My First Claims-Aware ASP.NET Service Using ACS
-
How to: Configure AD FS 2.0 as an Identity Provider
-
How to: Configure Google as an Identity Provider
-
How to: Configure Facebook as an Identity Provider
-
How to: Configure Yahoo! as an Identity Provider
-
How to: Configure Trust Between ACS and ASP.NET Web Applications Using X.509 Certificates
-
How to: Create an Access Control Namespace
-
How to: Delete an Access Control Namespace
-
How to: Host Login Pages in Your ASP.NET Web Application
-
How to: Implement Token Transformation Logic Using Rules
-
How to: Implement Claims Authorization in a Claims-Aware ASP.NET Application Using WIF and ACS
-
How to: Implement Role Based Access Control (RBAC) in a Claims-Aware ASP.NET Application Using WIF and ACS
-
How to: Manage the Access Control Namespace for a Service Bus
-
How to: Request a Token from ACS via the OAuth WRAP Protocol
-
How to: Use an Error URL for Custom Error Handling
-
How to: Use ACS Management Service to Configure an OpenID Identity Provider
-
How to: Use ACS Management Service to Configure Facebook as an Internet Identity Provider
-
How to: Use ACS Management Service to Configure AD FS 2.0 as an Enterprise Identity Provider
-
How to: Use ACS Management Service to Configure Rules and Rule Groups
-
How to: Use ACS Management Service to Configure Certificates and Keys
-
How to: Use ACS Management Service to Configure Service Identities
-
How to: Use ACS Management Service to Configure Relying Party Applications
See Also
Show: