28.12.2013 Views

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

At a Glance xxxiii<br />

Chapter 7 – Internet Security<br />

This chapter presents a set of common Internet application scenarios, and for<br />

each one presents recommended security configurations, configuration steps, and<br />

analysis.<br />

This chapter covers the following Internet application scenarios:<br />

● <strong>ASP</strong>.<strong>NET</strong> to SQL Server<br />

● <strong>ASP</strong>.<strong>NET</strong> to Remote Enterprise Services to SQL Server<br />

This scenario is shown in Figure 7.<br />

Alice<br />

Mary<br />

Bob<br />

NTFS<br />

Permissions<br />

(Authorization)<br />

IIS<br />

Web Server<br />

URL<br />

Authorization<br />

(Authorization)<br />

<strong>ASP</strong>.<strong>NET</strong><br />

<strong>ASP</strong><strong>NET</strong><br />

(Process<br />

Identity)<br />

Integrated Windows<br />

(Authentication)<br />

Require SSL<br />

(Privacy/Integrity)<br />

SOAP<br />

IIS<br />

Application Server<br />

Windows<br />

(Authentication)<br />

<strong>ASP</strong>.<strong>NET</strong><br />

(Web<br />

Services<br />

Façade)<br />

SSL<br />

(Privacy/Integrity)<br />

Anonymous<br />

Authentication<br />

Forms<br />

Authentication<br />

SSL<br />

(Privacy/<br />

Integrity)<br />

Enterprise Services<br />

Server Application<br />

(dllhost.exe)<br />

ES Process<br />

Identity<br />

IPSec<br />

(Privacy/<br />

Integrity)<br />

User defined<br />

database roles<br />

(Authorization)<br />

SQL<br />

Server<br />

Windows<br />

Authentication<br />

Database Server<br />

Figure 7<br />

Security configuration for <strong>ASP</strong>.<strong>NET</strong> to remote Enterprise Services to SQL Server<br />

Read this chapter to learn how to:<br />

● Use Forms authentication with a SQL Server credential database.<br />

● Avoid storing passwords in the credential database.<br />

● Authorize Internet users with URL Authorization and .<strong>NET</strong> roles.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!