Describe what windows-integrated authentication is

Assignment Help Management Information Sys
Reference no: EM131525907 , Length: 5

Assignment : Secure Intranet Portal Login

Background:

You are the security professional for a medium-sized manufacturing company. The organization would like to deploy a secure portal for in-house use only. The portal will be available from the company's intranet.

The company is utilizing a Microsoft Internet Information Services (IIS) server to run the local intranet website. The portal will be created by in-house programming staff utilizing ASP.NET technology and scripting.

The management requires the login to be protected using Hypertext Transfer Protocol Secure (HTTPS). In addition, the management would like to use an integrated login so that users do not have to remember or create a separate username or password for this portal login.

The company is using a Windows Server 2012 Active Directory infrastructure. All users logging on to the portal also have existing active directory user accounts.

The company also has an in-house Windows Server that serves as a local certificate authority for other existing web applications and services.

Tasks:

Create a 4- to 5-page report that will be shared with the company's board of directors, providing guidance and recommendations on how to best secure the web portal. Your report should cover the following aspects:

Describe what Windows-integrated authentication is and how it could potentially be used to provide secure access control to the portal.

Describe the use of Windows security groups and explain how a connection to active directory could be performed using the existing technology (existing IIS server and Windows Server 2012 Active Directory).

Describe how Windows certificate services work. Recommend a solution that would utilize the in-house Windows certificate authority server to provide a certificate to the new portal.

Explain how users can connect and log on to the portal in a secure fashion using secured socket layer (SSL) or HTTPS to ensure that all login credentials and activities on the portal are secure and encrypted.

Ensure that you write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Reference no: EM131525907

Questions Cloud

Rise of industrial unionism in the united states : After so many years of craft unionism, what led to the rise of industrial unionism in the United States?
Discuss the pros and cons of the planning function : Learning Activity Assignment- Explore the Internet and retrieve articles that discuss the pros and cons of the planning function.
Issues contributing to the rampant substance : What can human service professionals do to assist clients struggling with addiction?
Aspect of compensation : What activity has/is occurring which would impact any aspect of compensation? 300-500words to answer.
Describe what windows-integrated authentication is : Describe what Windows-integrated authentication is and how it could potentially be used to provide secure access control to the portal.
Manufacturing company based in australia : You are a consultant hired by a top manufacturing company based in Australia and are required to write a report/develop a plan to assist the company.
Are you primarily interested in the series of mysteries : Are you primarily interested in the series of "mysteries" that unfold within the film? Are you more interested how certain elements of the action reveal
Discuss capital assets and long-term debt : The fund-basis financial statements of Cherokee Library District (a specialpurpose government engaged only in governmental activities) have been completed.
Effective human resource practices : Why are effective human resource practices often a better competitive resource than equipment and buildings? Be specific. Use examples when possible.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe cloud computing and its pros and cons

Business case: Analyze the following business case and provide your recommendations. Describe cloud computing and its pros and cons in three paragraphs

  How has teleconferencing changed

How has teleconferencing changed with global Internet access from mobile locations? What additional roles is conferencing taking on in business

  What is the schedule variance at the end of period 5

What is the schedule variance at the end of period 5?-  What is the cost variance at the end of period 5? - Given the current information, will the project finish on schedule and on budget?

  Prepare a report on health administration

Prepare a report on Health Administration.Your decision to either keep the patient in hospital or discharge the patient. Provide a rationale for your decision.

  Service request for riordan manufacturingthis document

service request for riordan manufacturingthis document needs to be 4 to 6 pages in length and it needs to discuss the

  The purpose of the discussion board is to allow students to

the purpose of the discussion board is to allow students to learn through sharing ideas and experiences as they relate

  Lists the top five elements of the health care system

Write a paper of 1,000-1,200 words that lists the top five elements of the health care system that most need reform, in your opinion. Justify your choices through a logical analysis of the elements' impact on the current system.Refer to the assign..

  Explain security awareness and its importance

Explain security awareness and its importance.Explain network and data privacy policies.Explain the different security positions within information security. Explain what a security incident response team handles.

  Explain the system''s function and value

Describe an information system - Use the concepts of input, processing, output, and feedback to describe the system's function and value.

  What is the name of the process used in user''s identity

What is the name of the process that is used to establish whether or not a user's identity is legitimate

  Discus about the quality and its related aspects

"Quality" Please respond to the following:Rank the following parties as it relates to their responsibility over the quality of project deliverables. Justify your ranking. Project manager,The development team,The project sponsor.

  Define self-concept self-image and self-esteem

Define self-concept, self-image, and self-esteem. Write at least two sentences on each term. Provide an example of how your self-concept, self-image, or self-esteem has affected your interpersonal communication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd