I just don't still get Claim Based Authentication/Authorization workflow.
Application allows authentication via Facebook.com
After the user is authenticated, an admin can give her/him a claim of having the role of Manager, which create another claim (where?)
Of course, this claim won't be on facebook.com server, question 1: where should that claim be stored ?
When the user login again later, I get the claim of facebook.com and the i should get the claim from application ? and merge them ?
How is the workflow. Trying to understand claims in practical usage.
Basically, facebook tell me that i'm john@doe.com and 'field in the blanks' adds a claim that I'm also a manager of domain.com
then I pass those claims to domain.com ?
How should I configure in asp.net the application at domain.com to trust facebook and 'filled in the blank piece' and request claims form both ?
I guess I'm using external providers for Authentication and my own provider for Authorization, how this is created on ASP.NET (web api / mvc) ?
UPDATE (for clarification)
Let's get backwards. I create a web application where users can register. 'Somehow' there's an trusted ClaimsBased authority somewhere (this should be another application??) where I request the claims for a particular user to see if have particular rights on my application.
So I imagine something like :
/authserver/claims
and my validation checks if X claim is met to do certain operation.
later I add facebook. now I have
/facebook/claims
which tells me the user is X and
/authserver/claims to see if can do operation X on resource Y.
how this is managed on ASP.NET ? and where my own claims should be created/exposed/developed ?
I think I'm missing something fundamental here.