Its a little gap in between my third and fourth part, anyways I am going to write 4th part of the series. First you can read my earlier parts from the link below.
- Claim based Authentication and WIF : Part 1
- Claim based Authentication and WIF : Part 2
- Claim based Authentication and WIF : Part 3
As if you have read my earlier posts in the series, you can visualize that in my first post I discussed about the Idea about Claim based authentication, basics and various components of Claim based authentication.