11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

564 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>URL AuthorizationAny application can use this gatekeeper. It is configured using elements that control which users <strong>and</strong> groups of users should have access to theapplication. The default element from Machine.config is shown below:URL Authorization NotesUse the following to help you successfully configure URL Authorization:●●●Authorization settings in <strong>Web</strong>.config usually refer to all of the files in the currentdirectory <strong>and</strong> all subdirectories, unless a subdirectory contains its own <strong>Web</strong>.configwith an element. In this case, the settings in the subdirectoryoverride the parent directory settings.URL authorization only applies to file types that are mapped by IIS to theASP.NET ISAPI extension: Aspnet_isapi.dll.When your application uses Windows authentication, you are authorizing accessto Windows user <strong>and</strong> group accounts. User names take the form of“authority\WindowsUserName” <strong>and</strong> role names take the form of“authority\WindowsGroupName”, where authority is either a domain name orthe local machine name depending on the account type.A number of well known accounts are represented with “BUILTIN”strings. For example, the local administrators group is referred to as“BUILTIN\Administrators”. The local users group is referred to as“BUILTIN\Users”.Note With.NET Framework version 1.0, the authority <strong>and</strong> the group name are case sensitive.The group name must match the group name that appears in Windows exactly.●When your application uses Forms authentication, you authorize the custom user<strong>and</strong> roles maintained in your custom user store. For example, if you use Forms toauthenticate users against a database, you authorize against the roles retrievedfrom the database.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!