11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

348 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sThis chapter gives recommendations <strong>and</strong> guidance to help you build secure remotecomponents. This includes components that use ASP.NET <strong>and</strong> the HttpChannel, <strong>and</strong>those that use custom executables <strong>and</strong> the TcpChannel. The typical deploymentpattern assumed by this chapter is shown in Figure 13.1, where remote objects arelocated on a middle-tier application server <strong>and</strong> process requests from ASP.NET <strong>Web</strong>application clients, <strong>and</strong> also Windows applications deployed inside the enterprise.PerimeterFirewallOptionalFirewallOptionalFirewall<strong>Web</strong> Server<strong>Application</strong> ServerDatabase ServerHTTPASP. NETHostObjectSQLServerTcpChannelTcpChannelOptionalFirewallWindows<strong>Application</strong>Figure 13.1Typical remoting deploymentIn this common scenario, the remote component services requests from front-end<strong>Web</strong> applications. In this case, ASP.NET on the <strong>Web</strong> server h<strong>and</strong>les the authentication<strong>and</strong> authorization of callers. In addition, middle-tier remote components are oftenaccessed by Enterprise Windows applications.How to Use This ChapterThis chapter discusses various techniques to design <strong>and</strong> build secure componentsthat you communicate with using the .NET Framework remoting technology.To get the most from this chapter:● Use in conjunction with Chapter 17, “Securing Your <strong>Application</strong> Server.”Chapter 17 gives an administration perspective on securing a middle-tier remotingsolution.● See “Checklist: Securing Remoting” in the Checklists section of this guide. Thisgives a summary of the security measures required to build <strong>and</strong> configure secure.NET Framework remoting solutions.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!