This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use. Learn more
Microsoft Logo
Gray Pipe
Developer Network Developer Network Developer
Sign in

Subscriber portal

Get tools
  • Downloads
    • Visual Studio
    • SDKs
    • Trial software
      • Free downloads
      • Office resources
      • SharePoint Server 2013 resources
      • SQL Server 2014 Express resources
      • Windows Server 2012 resources
  • Programs
    • Subscriptions
      • Overview
      • Administrators
    • Students
      • Microsoft Imagine
      • Microsoft Student Partners
    • ISV
    • Startups
    • Events
  • Community
    • Magazine
    • Forums
    • Blogs
    • Channel 9
  • Documentation
    • APIs and reference
    • Dev centers
    • Samples
    • Retired content
search clear
We’re sorry. The content you requested has been removed. You’ll be auto redirected in 1 second.
patterns & practices Services Development Improving Web Services Security: Scenarios and Implementation Guidance for WCF
Improving Web Services Security: Scenarios and Implementation Guidance for WCF PART II: WCF Security Fundamentals
PART II: WCF Security Fundamentals
PART II: WCF Security Fundamentals
Foreword by Nicholas Allen
Foreword by Rockford Lhotka
Introduction
Solutions at a Glance
Fast Track: A Guide for Getting Started and Applying the Guidance
PART I: Security Fundamentals for Web Services
PART II: WCF Security Fundamentals
Chapter 4: WCF Security Fundamentals
Chapter 5: Authentication, Authorization, and Identities in WCF
Chapter 6: Impersonation and Delegation in WCF
Chapter 7: Message and Transport Security
Chapter 8: Bindings
PART III: Intranet Application Scenarios
PART IV: Internet Application Scenarios
WCF Security Checklist
WCF Security Guidelines
Practices at a Glance: WCF Security
WCF Security Questions and Answers (Q&A)
How-to Articles
WCF Security Resources
TOC
Collapse the table of content
Expand the table of content
This documentation is archived and is not being maintained.
This documentation is archived and is not being maintained.

PART II: WCF Security Fundamentals

patterns & practices Developer Center

In This Part:

  • Chapter 4: WCF Security Fundamentals
  • Chapter 5: Authentication, Authorization, and Identities in WCF
  • Chapter 6: Impersonation and Delegation in WCF
  • Chapter 7: Message and Transport Security in WCF
  • Chapter 8: Bindings

Show:
Print Export (0)
Print Share
IN THIS ARTICLE
    Is this page helpful?
    Additional feedback?
    1500 characters remaining
    Thank you! We appreciate your feedback.

    Dev centers

    • Windows
    • Office
    • Visual Studio
    • Microsoft Azure
    • More...

    Learning resources

    • Microsoft Virtual Academy
    • Channel 9
    • MSDN Magazine

    Community

    • Forums
    • Blogs
    • Codeplex

    Support

    • Self support

    Programs

    • BizSpark (for startups)
    • Microsoft Imagine (for students)
    United States (English)
    • Newsletter
    • Privacy & cookies
    • Terms of use
    • Trademarks
    logo © 2017 Microsoft
    © 2017 Microsoft