11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

224 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sRegistrySQLServerDNSDatabase<strong>Web</strong>ServicesDnsPermissionRegistryPermission<strong>Web</strong>PermissionEnvironmentPermission<strong>Web</strong><strong>Application</strong>SqlClientPermissionOLEDBDataSourceOleDbClientPermissionFileIOPermissionEventLogPermissionFileSystemEnvironmentVariables<strong>Security</strong>Permission.UnmanagedCodeSocketsPermissionWindowsEvent LogUnmanagedCodeRemoteServersFigure 9.1Common resource types accessed from ASP.NET <strong>Web</strong> applications <strong>and</strong> associated permission typesFull Trust <strong>and</strong> Partial TrustBy default, <strong>Web</strong> applications run with full trust. Full-trust applications are grantedunrestricted code access permissions by code access security policy. Thesepermissions include built-in system <strong>and</strong> custom permissions. This means that codeaccess security will not prevent your application from accessing any of the securedresource types that Figure 9.1 shows. The success or failure of the resource accessattempt is determined purely by operating system-level security. <strong>Web</strong> applicationsthat run with full trust include all ASP.NET applications built using .NET Frameworkversion 1.0. By default, .NET Framework version 1.1 applications run with full trust,but the trust level can be configured using the element, which is describedlater in this chapter.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!