11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 17: Securing Your <strong>Application</strong> Server 487NTLM / Kerberos(Authentication)<strong>Web</strong> Server(Client)HTTPChannelIISASP.NETHostIPSecor SSL(SecureCommunication)IIS <strong>and</strong> ASP.NETGatekeepers(Authorization)Figure 17.6Remoting with the HTTP channel <strong>and</strong> an ASP.NET hostIn this scenario, you can use Windows integrated authentication to authenticate theASP.NET <strong>Web</strong> application process identity. You can also use SSL for securecommunication <strong>and</strong> the gatekeepers provided by IIS <strong>and</strong> ASP.NET for authorization.Enterprise Services (COM+) <strong>Security</strong> ConsiderationsCOM+ provides the underlying infrastructure for Enterprise Services; therefore,secure COM+ if you use it on the middle-tier application server. Two main steps areinvolved in securing an application server that uses Enterprise Services:● Secure the Component Services Infrastructure.You must secure the underlying operating system <strong>and</strong> Enterprise Servicesinfrastructure. This includes base security measures, such as applying patches <strong>and</strong>updates, <strong>and</strong> disabling unused services, blocking unused ports, <strong>and</strong> so on.● Configure Enterprise Services application security.You must secure the Enterprise Services application that is deployed on the server,taking into account application-specific security needs.The developer can specify many of the application <strong>and</strong> component-level securityconfiguration settings using metadata embedded in the deployed assemblies. Thesegovern the initial catalog security settings that are applied to the application when itis registered with Enterprise Services. Then, the administrator can view <strong>and</strong> amendthese if necessary by using the Component Services tool.Secure the Component Services InfrastructureEnterprise Services is not an optional component, <strong>and</strong> it is installed as an integralpart of Windows 2000. From a security perspective, knowing what operating systemcomponents are installed to support Enterprise Services helps you take appropriatesecurity measures.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!