Page 246 - DCAP312_WEB_TECHNOLOGIES_II
P. 246

Web Technologies-II



                   Notes         This Figure 12.3 shows the following sequence of events:
                                    1.  A client generates a request for a protected resource.
                                    2.  IIS receives the request, and if the requestor is authenticated by IIS, or if IIS anonymous
                                      access is enabled, the request gets passed on to the ASP.NET application. Because
                                      the authentication mode in the ASP.NET application is set to forms in this case, IIS
                                      authentication is not used.
                                    3.  If there is no cookie attached to the request, ASP.NET redirects the request to a logon
                                      page, the path of which resides in the application’s configuration file. On the logon page,
                                      the client user enters the required credentials (usually a name and password).
                                    4.  The application code checks the credentials to confirm their authenticity, usually in an
                                      event handler. If the credentials are authenticated, the application code attaches a ticket
                                      (as a cookie) containing the user name, but not the password. If authentication fails, the
                                      request is usually returned with an Access Denied message or the logon form is presented
                                      again.
                                    5.  After a ticket is issued by the application, ASP.NET just checks the ticket for validity using
                                      a message authentication check. Applications do not need the credentials in the .config
                                      files. In fact, ASP.NET does not check them after the cookie is issued, even if they are
                                      present.
                                    6.  If the user is authenticated, ASP.NET checks authorization and can either allow access to
                                      the originally requested, protected resource or redirect the request to some other page,
                                      depending on the design of the application. It can also direct the request to a custom
                                      authorization module where the credentials are tested for authorization to access the
                                      protected resource. If authorization fails, ASP.NET always redirects to the logon page.
                                    7.  If the user is authorized, access is granted to the protected resource; or the application
                                      might require an additional test of the credentials before authorizing access to the protected
                                      resource, depending on the design of the application.
                                                The first Microsoft web server was a research project at the European Microsoft
                                                Windows NT Academic Centre (EMWAC), part of the University of Edinburgh
                                                in Scotland, and was distributed as freeware.




                                            Create a flow chart of ASP.NET authentication.

                                 Self Assessment Questions
                                    1.  ……………… uses a SQL Server user store.
                                       (  a)  ActiveDirectory Membership Provider
                                       (  b)  Directory Application Mode
                                       (  c)  SqlMembership Provider
                                       (  d)  None of these
                                    2.  A successful system requires careful planning, and web site ………………must have a
                                      clear understanding of the options for securing their site.
                                       (  a)  administrators           (b)  programmers
                                       (  c)  administrators and programmers  (d)  None of these
                                    3.  ……………………. are a number of different ways to design security into ASP.NET
                                      applications.
                                       (  a)  Internet Information Services   (b)  Security data flow
                                       (  c)  Data flow                (d)  Data control flow




        240                               LOVELY PROFESSIONAL UNIVERSITY
   241   242   243   244   245   246   247   248   249   250   251