11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 17: Securing Your <strong>Application</strong> Server 497ImpersonationDCOM clients set the impersonation level to determine the impersonationcapabilities of the server with which they are communicating. When an EnterpriseServices application on a middle-tier application server is configured, the configuredimpersonation level affects any remote calls made to downstream components,including the database server. The impersonation level is set on the <strong>Security</strong> page ofthe Properties dialog box of the application in Component Services, as Figure 17.9shows.Figure 17.9DCOM impersonation levelsThe appropriate level depends on the desired application-level functionality,although you should use the following guidelines to determine an appropriate level:●●●●Avoid Anonymous impersonation. The downstream component will not be ableto identify your application for authentication or authorization purposes.Use Identify to allow the downstream component to authenticate <strong>and</strong> authorizeyour application. It will not, however, be able to access local or remote resourcesusing the impersonated security context of your application.Use Impersonate if you want to allow the downstream component to impersonatethe identity of your application so that it can access local resources on thedownstream server.Use Delegate if you want to allow the downstream component to impersonate theidentity of your application so that it can access local or remote resources. Thisrequires accounts configured for delegation in Active DirectoryAll downstream resource access that is performed by serviced components on yourmiddle-tier application server normally uses the server application’s identity. If,however, the serviced components perform programmatic impersonation, <strong>and</strong> theclient application (usually an ASP.NET <strong>Web</strong> application or <strong>Web</strong> service on the <strong>Web</strong>server) has been configured to support Kerberos delegation, then the client’s identityis used.For more information, see “How To: Enable Kerberos Delegation in Windows 2000”in the “How To” section of “Microsoft patterns & practices Volume I, BuildingSecure ASP.NET <strong>Application</strong>s: Authentication, Authorization, <strong>and</strong> Secure Communication”at http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnnetsec/html/secnetlpMSDN.asp.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!