11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 17: Securing Your <strong>Application</strong> Server 495COM+ Role-Based <strong>Security</strong>Authorization in Enterprise Services applications is provided by Enterprise Services(COM+) roles. COM+ roles contain Windows user <strong>and</strong> group accounts <strong>and</strong> are usedto restrict access to the application, component, interfaces, <strong>and</strong> method. Ideally, yourEnterprise Services applications should be configured for component levelauthorization, which allows you to authorize callers to individual servicedcomponent methods.To configure role-based security:● Enable role-based security.●●Enable component-level access checks.Enforce component-level access checks.Enable Role-Based <strong>Security</strong>Role-based security is disabled by default on Windows 2000. The reverse is true forWindows Server 2003. To enable role-based security1. Start the Component Services tool <strong>and</strong> display the Properties dialog box of theapplication.2. Click the <strong>Security</strong> tab.3. Select Enforce access checks for this application.Figure 17.7Enabling role-based securityEnable Component-Level Access ChecksWithout component-level access checks, any account that is used to connect to anyapplication component is granted access if it is a member of any role within theapplication. Component-level access checks allow individual components to applytheir own authorization. This is the recommended level of granularity.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!