11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

316 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sSummaryDTC RequirementsIf your application uses COM+ distributed transactions <strong>and</strong> these are used acrossremote servers separated by an internal firewall, then the firewall must open thenecessary ports to support DTC traffic.If your deployment architecture includes a remote application tier, transactions areusually initiated within the Enterprise Services application <strong>and</strong> propagated to thedatabase server. In the absence of an application server, the Enterprise Servicesapplication on the <strong>Web</strong> server initiates the transaction <strong>and</strong> propagates it to the SQLServer resource manager.For information about configuring firewalls to support DTC traffic, see Chapter 18,“Securing Your Database Server.”Enterprise Services (COM+) security relies on Windows security to authenticate <strong>and</strong>authorize callers. Authorization is configured <strong>and</strong> controlled with COM+ roles thatcontain Windows group or user accounts. The majority of threats that relate toEnterprise Services applications <strong>and</strong> serviced components can be addressed withsolid coding techniques, <strong>and</strong> appropriate catalog configuration.The developer should use declarative attributes to set the serviced componentsecurity configuration. These attributes determine how the application is configuredwhen it is initially registered with Enterprise Services (typically using Regsvcs.exe).Not every security configuration setting can be set with attributes. An administratormust specify the run-as identity for a server application. The administrator must alsopopulate roles with Windows group or user accounts at deployment time.When you are developing serviced components or are evaluating the security of yourEnterprise <strong>Security</strong> solution, use “Checklist: Securing Enterprise Services” in the“Checklists” section of this guide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!