Windows validating identity
If your identity is unverified you will see a notification pop-up asking you to verify your account.
If you have missed such a notification, you will see it in the Action Center.
Note This is just a simple example of SSO and should not be used in your production code.
As always, when you're dealing with identity and authentication, you have to make sure that your code meets the security requirements of your organization.
The Token Authentication class provides a method, Get Response From Service, that will return a response for previously authenticated tokens, or ask the user to provide credentials that can be authenticated and associated with the identity token.
The code is not complete; it assumes that you will provide the following objects and methods.
b) Select WPA2-‐Enterprise in the Security type dropdown menu.
Second, make sure that the token is well-formed, that it is for your Outlook add-in, that it has not expired, and that you can extract a valid URL for the authentication metadata document.
You can implement a single sign-on (SSO) authentication scheme for an information service that enables customers who are using Outlook add-ins to connect to your service by using their Exchange server credentials.
This article shows how to match credentials by using a simple Dictionary object-based user data store.
Click OK to close miis Wireless Network properties.
Enter your username and password (same as your email account). The username should be “MIDD\your_username”(MIDD\tsmith for example) You should now be connected to the miis network!Your Outlook add-in can send you an identity token, but before you trust the request you must validate the token to ensure that it came from the Exchange server that you expect.