11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

11Building Secure ServicedComponentsIn This Chapter●●●●●●●OverviewPreventing anonymous access to serviced componentsProtecting sensitive dataAuthorizing callers by using Enterprise Services (COM+) rolesUsing least privileged run-as accountsSecuring secrets in object constructor stringsAuditing from middle tier serviced componentsDeployment considerations for serviced componentsCOM+ infrastructure services, also known as Enterprise Services, can beaccessed from managed code. Enterprise Services applications consist ofone or more serviced components that are managed classes derived fromSystem.EnterpriseServices.ServicedComponent.Serviced components are typically used to encapsulate an application’s business<strong>and</strong> data access logic <strong>and</strong> are used when infrastructure services such as distributedtransactions, object pooling, queued components, <strong>and</strong> others are required in anapplication’s middle tier. Enterprise Services applications often reside on middle-tierapplication servers as shown in Figure 11.1.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!