11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

13Building Secure RemotedComponentsIn This Chapter●●●●OverviewAuthenticating <strong>and</strong> authorizing callersPreventing denial of service attacks against remote componentsImplementing secure serializationProtecting sensitive dataThe Microsoft .NET Framework Remoting infrastructure has no defaultauthentication or authorization mechanisms. However, if you host remotecomponents with ASP.NET <strong>and</strong> use the HttpChannel for communication, you canuse ASP.NET <strong>and</strong> IIS authentication <strong>and</strong> authorization services.If performance is an issue, you might decide to use a custom host with theTcpChannel. You should only do so in trusted subsystem scenarios, where the rangeof possible callers is carefully controlled through out-of-b<strong>and</strong> techniques such as theuse of IPSec policies, which only allow communication from specified <strong>Web</strong> servers.With the TcpChannel, you must build your own authentication <strong>and</strong> authorizationmechanisms. This is contrary to the principle of using tried <strong>and</strong> tested platform levelsecurity services, <strong>and</strong> requires significant development effort.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!