blog.pedrofelix.org
Alice in Claims: protocols
Introduction This is the third post of a series about claims based identity management and the Windows Identity Foundation (WIF). The first two were: Alice in Claims: decentralized identity Alice i…