11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 6: .NET <strong>Security</strong> Overview 133What is the code? What can the code do?(Evidence-based authentication) (Permission-basedAuthorization)CASPolicyUserCodeEvidenceCode Access <strong>Security</strong>Secure ResourcesPrivilegedOperations<strong>Web</strong> <strong>Application</strong>Figure 6.2Logical view of code-based securityThe authentication (identification) of code is based on evidence about the code, forexample, its strong name, publisher, or installation directory. Authorization is basedon the code access permissions granted to code by security policy. For moreinformation about .NET Framework code access security, see Chapter 8, “CodeAccess <strong>Security</strong> in Practice.”.NET Framework Role-Based <strong>Security</strong>.NET Framework role-based security is a key technology that is used to authorize auser’s actions in an application. Roles are often used to enforce business rules. Forexample, a financial application might allow only managers to perform monetarytransfers that exceed a particular threshold.Role-based security consists of the following elements:●●●●Principals <strong>and</strong> identitiesPrincipalPermission objectsRole-based security checksURL authorization

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!