I have an MVC3 application that has a custom membership provider and user/roles that are stored in the database. Users are created manually in the application as required and appropriate roles assigned.
I'd like to now extend the application to provide an option of using Active Directory, though because the application has several custom fields + tables with FK lookups on the user, I am thinking that I will still have to have a custom version of the default active directory membership provider.
Has anybody on SF done something similar that they can share with me? Thanks
I know this is an old question but...
Let see where to start
In my web app i set up federated claims based authentication directly with my ADFS server. I haven't been able to find a good tutorial on how to do this cause it's not trivial. But there are plenty of references on how to do this using azure ACS as a middle man. This one will at least get you started:
http://haishibai.blogspot.com/2011/05/tutorialaspnet-mvc-3-claim-based.html
Once you get this working you just need a couple of things.
Add a couple of properties on your database user table that you can link with AD. I store the AD GUID in mine, but I also use Email address as a secondary. This allows me to create users in my app, then have them authenticate with AD. I just pass back their email as a claim, match them with user in my app, then add AD GUID to user.
I also take advantage of inheritance to do my authentication. All my controllers inherit from BaseController so they get this standard behavior.
Hope that helps!