11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

186 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sCode GroupsEach policy file contains a hierarchical collection of code groups. Code groups areused to assign permissions to assemblies. A code group consists of two elements:●●A membership condition. This is based on evidence, for example, an assembly’szone or its strong name.A permission set. The permissions contained in the permission set are granted toassemblies whose evidence matches the membership condition.How Does It Work?Figure 8.1 shows a simplified overview of code access security.HashStrong NamePublisher SigZoneURLSiteEnterpriseMachineUserAppDomain(ASP.NET)Load AssemblyGather Evidence<strong>Security</strong>Policy`Grant Permission Sets(yielding permissions)AdministratorAssembly performsprivileged operationDem<strong>and</strong> PermissionPermissionGranted?NoYesContinue withprivilegedoperation (oraccess resource)Throw <strong>Security</strong> ExceptionFigure 8.1Code access security — a simplified view

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!