Professional ASP.NET 3.5 Security, Membership, and Role Management With C♯ and VB

Professional ASP.NET 3.5 Security, Membership, and Role Management With C♯ and VB

eBook - 2009
Rate this:
WILEY

This book is intended for developers who are already familiar with and have a solid understanding of ASP.NET 1.1 and ASP.NET 2.0 security concepts, especially in the areas of forms authentication, page security, and website authorization. It assumes that you have a good understanding of the general functionality of Membership and Role Manager. It is also assumes that you have some familiarity working with ASP.NET AJAX 3.5. The book aims to “peel back the covers” of various ASP.NET security features so you can gain a deeper understanding of the security options available to you. Explaining the new IIS 7.0 and its Integrated mode of execution is also included in the book.

This book was written using the .NET 3.5 Framework along with the .NET Framework SPI on both Windows Sever 2008 and Windows Vista. The sample code in the book has been verified to work with .NET 3.5 Framework and .NET 3.5 Framework SPI on Windows Vista. To run all of the samples in the book you will need the following:

  • Windows Server 2008 or Windows Vista
  • Internet Information Services 7.0 (IIS 7.0)
  • Visual Studio 2008 RTM
  • Either SQL Server 2000 or SQL Server 2005
  • A Window’s Sever 2008 domain running at Windows Server 2008 functional level

This book covers many topics and areas in ASP.NET 2.0 and ASP.NET 3.5. It first introduces Internet Information Services 7.0 (IIS 7.0). It goes on to explain in detail the new IIS 7.0 Integrated mode of execution. Next, detailed coverage of how security is applied when the ASP.NET application starts up and when a request is processed in the newly introduced integrated request-processing pipeline is discussed. After this, the book branches out and begins to cover security information for features such as trust levels, forms authentication, page security, and session state. This will show you how you can benefit from the IIS 7.0 Integrated mode to make better use of ASP.NET features. You will also gain an understanding of the lesser known security features in ASP.NET 2.0 and ASP.NET 3.5.

In chapter 10 the book changes direction and addresses two security services in ASP.NET 2.0 and ASP.NET 3.5: Membership and Role Manager. You will learn about the provider model that underlies each of these features. The internals of the feature are also discussed, as well as the SQL- and Active Directory-based providers included with them. The discussion of ASP.NET features is continued in chapter 17, which is dedicated to the ASP.NET AJAX 3.5 security integration with ASP.NET 3.5; it will also show how to authenticate and authorize users with JavaScript code written from the client-side.

The book closes with a chapter about the best practices ASP.Net developers should follow to protect their applications from attack.

Chapter 1 starts by refreshing ideas on application pools and worker processes. It later gets into the major components that make up IIS 7.0. Chapter 2 begins by introducing the advantages of the IIS 7.0 and ASP.NET integrated mode. Chapter 3 gives you a walkthrough of the security processing that both IIS 7.0 and ASP.NET perform in the integrated/unified request-processing pipeline. Chapter 4 defines what an ASP.NET trust level is and how ASP.NET trust levels work to provide secure environments for running web applications. Chapter 5 covers the security features in the 2.0 and 3.5 Frameworks’ configuration systems. Chapter 6 explains ASP.NET 2.0 and ASP.NET 3.5 features for forms authentication. Chapter 7 demonstrates using IIS 7.0 wildcard mappings and ASP.NET 2.0 and ASP.NET 3.5 support for wildcard mappings to share authentication and authorization information with Classic ASP applications. Chapter 8 covers security features and guidance for session state. Chapter 9 describes some lesser known page security features from ASP.NET 1.1 and describes how ASP.NET 2.0 and ASP.NET 3.5 options for securing viewstate and postback events. Chapter 10 gives

This book is intended for developers who are already familiar with and have a solid understanding of ASP.NET 1.1 and ASP.NET 2.0 security concepts, especially in the areas of forms authentication, page security, and website authorization. It assumes that you have a good understanding of the general functionality of Membership and Role Manager. It is also assumes that you have some familiarity working with ASP.NET AJAX 3.5. The book aims to “peel back the covers” of various ASP.NET security features so you can gain a deeper understanding of the security options available to you. Explaining the new IIS 7.0 and its Integrated mode of execution is also included in the book.

This book was written using the .NET 3.5 Framework along with the .NET Framework SPI on both Windows Sever 2008 and Windows Vista. The sample code in the book has been verified to work with .NET 3.5 Framework and .NET 3.5 Framework SPI on Windows Vista. To run all of the samples in the book you will need the following:

  • Windows Server 2008 or Windows Vista
  • Internet Information Services 7.0 (IIS 7.0)
  • Visual Studio 2008 RTM
  • Either SQL Server 2000 or SQL Server 2005
  • A Window’s Sever 2008 domain running at Windows Server 2008 functional level

This book covers many topics and areas in ASP.NET 2.0 and ASP.NET 3.5. It first introduces Internet Information Services 7.0 (IIS 7.0). It goes on to explain in detail the new IIS 7.0 Integrated mode of execution. Next, detailed coverage of how security is applied when the ASP.NET application starts up and when a request is processed in the newly introduced integrated request-processing pipeline is discussed. After this, the book branches out and begins to cover security information for features such as trust levels, forms authentication, page security, and session state. This will show you how you can benefit from the IIS 7.0 Integrated mode to make better use of ASP.NET features. You will also gain an understanding of the lesser known security features in ASP.NET 2.0 and ASP.NET 3.5.

In chapter 10 the book changes direction and addresses two security services in ASP.NET 2.0 and ASP.NET 3.5: Membership and Role Manager. You will learn about the provider model that underlies each of these features. The internals of the feature are also discussed, as well as the SQL- and Active Directory-based providers included with them. The discussion of ASP.NET features is continued in chapter 17, which is dedicated to the ASP.NET AJAX 3.5 security integration with ASP.NET 3.5; it will also show how to authenticate and authorize users with JavaScript code written from the client-side.

The book closes with a chapter about the best practices ASP.Net developers should follow to protect their applications from attack.

Chapter 1 starts by refreshing ideas on application pools and worker processes. It later gets into the major components that make up IIS 7.0. Chapter 2 begins by introducing the advantages of the IIS 7.0 and ASP.NET integrated mode. Chapter 3 gives you a walkthrough of the security processing that both IIS 7.0 and ASP.NET perform in the integrated/unified request-processing pipeline. Chapter 4 defines what an ASP.NET trust level is and how ASP.NET trust levels work to provide secure environments for running web applications. Chapter 5 covers the security features in the 2.0 and 3.5 Frameworks’ configuration systems. Chapter 6 explains ASP.NET 2.0 and ASP.NET 3.5 features for forms authentication. Chapter 7 demonstrates using IIS 7.0 wildcard mappings and ASP.NET 2.0 and ASP.NET 3.5 support for wildcard mappings to share authentication and authorization information with Classic ASP applications. Chapter 8 covers security features and guidance for session state. Chapter 9 describes some lesser known page security features from ASP.NET 1.1 and describes how ASP.NET 2.0 and ASP.NET 3.5 options for securing viewstate and postback events. Chapter 10 gives

Publisher: Indianapolis, IN : Wiley Pub., ©2009
ISBN: 9780470442944
0470442948
Characteristics: 1 online resource (xxix, 904 pages) : illustrations
Additional Contributors: Schackow, Stefan 1970-

Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age Suitability

Add Age Suitability

There are no age suitabilities for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Subject Headings

  Loading...

Find it at NPL

  Loading...
[]
[]
To Top