28.12.2013 Views

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

At a Glance xxxvii<br />

●<br />

●<br />

●<br />

Use RPC encryption to secure sensitive data passed to and from serviced<br />

components.<br />

Understand the process of RPC authentication level negotiation.<br />

Use DCOM through firewalls.<br />

Chapter 10 – Web Services Security<br />

This chapter focuses on platform level security for Web services using the underlying<br />

features of IIS and <strong>ASP</strong>.<strong>NET</strong>. For message level security, Microsoft is developing<br />

the Web Services Development Kit, which allows you to build security solutions<br />

that conform to the WS-Security specification, part of the Global XML Architecture<br />

(GXA) initiative.<br />

The <strong>ASP</strong>.<strong>NET</strong> Web services platform security architecture is shown in Figure 10.<br />

Authentication<br />

SOAP Header<br />

(optional<br />

credentials)<br />

SOAP Body<br />

1<br />

IIS<br />

2<br />

(inetinfo.exe)<br />

3<br />

Authentication<br />

Anonymous<br />

Basic<br />

Digest<br />

Integrated<br />

Certificate<br />

Authentication<br />

Windows<br />

None<br />

(Custom)<br />

<strong>ASP</strong>.<strong>NET</strong> Web Service<br />

(aspnet_wp.exe)<br />

Authorization<br />

NTFS Permissions<br />

IP Address<br />

Restrictions<br />

Authorization<br />

File AuthZ<br />

URL AuthZ<br />

.<strong>NET</strong> Roles<br />

5 6<br />

Identity<br />

7<br />

Web Server<br />

4<br />

Authenticated caller’s<br />

access token (or<br />

IUSR_MACHINE<br />

access token)<br />

Locator<br />

Remote<br />

Resource<br />

<strong>ASP</strong>.<strong>NET</strong> Process<br />

Original Caller<br />

Fixed Service Identity<br />

Figure 10<br />

Web services security architecture

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!