28.12.2013 Views

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

At a Glance xxxv<br />

Read this chapter to learn how to:<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

Configure the various <strong>ASP</strong>.<strong>NET</strong> authentication modes.<br />

Implement Forms authentication.<br />

Implement Windows authentication.<br />

Work with IPrincipal and IIdentity objects.<br />

Effectively use the IIS and <strong>ASP</strong>.<strong>NET</strong> gatekeepers.<br />

Configure and use <strong>ASP</strong>.<strong>NET</strong> File authorization.<br />

Configure and use <strong>ASP</strong>.<strong>NET</strong> URL authorization.<br />

Implement declarative, imperative and programmatic role-based security, using<br />

principal permission demands and IPrincipal.IsInRole.<br />

Know when and when not to use impersonation within an <strong>ASP</strong>.<strong>NET</strong> Web<br />

application.<br />

Choose an appropriate account to run <strong>ASP</strong>.<strong>NET</strong>.<br />

Access local and network resources using the <strong>ASP</strong>.<strong>NET</strong> process identity.<br />

Access remote SQL Server databases using the local <strong>ASP</strong><strong>NET</strong> account.<br />

Call COM objects from <strong>ASP</strong>.<strong>NET</strong>.<br />

Effectively use the anonymous Internet user account in Web hosting<br />

environments.<br />

Store secrets in an <strong>ASP</strong>.<strong>NET</strong> Web application.<br />

<strong>Secure</strong> session and view state.<br />

Configure <strong>ASP</strong>.<strong>NET</strong> security in Web Farm scenarios.<br />

Chapter 9 – Enterprise Services Security<br />

This chapter explains how to secure business functionality in serviced components<br />

contained within Enterprise Services applications. It shows you how and when to<br />

use Enterprise Services (COM+) roles for authorization, and how to configure RPC<br />

authentication and impersonation. It also shows you how to securely call serviced<br />

components from an <strong>ASP</strong>.<strong>NET</strong> Web application and how to identify and flow the<br />

original caller’s security context through a middle tier serviced component.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!