28.12.2013 Views

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 1: Introduction 5<br />

Part IV, Reference<br />

This reference part of the guide contains supplementary information to help further<br />

your understanding of the techniques, strategies, and security solutions presented<br />

in earlier chapters. Detailed How Tos provide step-by-step procedures that enable<br />

you to implement specific security solutions. It contains the following information:<br />

● Chapter 13, “Troubleshooting Security”<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

“How Tos”<br />

“Base Configuration”<br />

“Configuration Stores and Tools”<br />

“How Does It Work?”<br />

“<strong>ASP</strong>.<strong>NET</strong> Identity Matrix”<br />

“Cryptography and Certificates”<br />

“<strong>ASP</strong>.<strong>NET</strong> Security Model”<br />

“Reference Hub”<br />

“Glossary”<br />

Key Terminology<br />

This section introduces some key security terminology used throughout the guide.<br />

Although a full glossary of terminology is provided within the “Reference” section<br />

of this guide, make sure you are very familiar with the following terms:<br />

● Authentication. Positively identifying the clients of your application; clients<br />

might include end-users, services, processes or computers.<br />

● Authorization. Defining what authenticated clients are allowed to see and do<br />

within the application.<br />

● <strong>Secure</strong> Communications. Ensuring that messages remain private and unaltered<br />

as they cross networks.<br />

● Impersonation. This is the technique used by a server application to access<br />

resources on behalf of a client. The client’s security context is used for access<br />

checks performed by the server.<br />

● Delegation. An extended form of impersonation that allows a server process<br />

that is performing work on behalf of a client, to access resources on a remote<br />

computer. This capability is natively provided by Kerberos on Microsoft®<br />

Windows® 2000 and later operating systems. Conventional impersonation (for<br />

example, that provided by NTLM) allows only a single network hop. When<br />

NTLM impersonation is used, the one hop is used between the client and server<br />

computers, restricting the server to local resource access while impersonating.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!