How does authorization work in asp.net ?, DOT NET Programming

Assignment Help:

The ASP.NET impersonation is totally controlled by entries in the applications web.config file. Default setting is "no impersonation". You can explicitly describe  that ASP.NET shouldn't use impersonation by including the following code in the file as shown:

It means that the ASP.NET will not perform any authentication and runs with its own priority . By default the ASP.NET runs as an unprivileged account named ASPNET. You can modify  this by making a setting in the processModel part of the machine.config file. Whenever you make this setting, it automatically applies to every site on the server. To the user a high-privileged system account instead of a low-privileged set the userName attribute of the processModel element to SYSTEM. Using this setting is a definite security risk,since  it elevates the privileges of the ASP.NET process to a point where it can do bad things to the operating system.

When you disable impersonation, all the request will run in the context of the account running the ASP.NET: either the ASPNET account or the system account. This is true when you are using anonymous access or authenticating users in few fashion. After the user has been authenticated, the ASP.NET uses its own identity to request access to resources.

The second possible setting is to turn on impersonation.

In this situation , the ASP.NET takes on the identity IIS passes to it. If you are allowing anonymous access in the IIS, this means that ASP.NET will impersonate the IUSR_ComputerName account that IIS itself uses. If you aren't allowing anonymous access,ASP.NET will take on  credentials of the authenticated user and made  requests for resources as if it were that user. Hence  by turning impersonation on and using a non-anonymous method of authentication in IIS, you can let users log on and use their identities within your ASP.NET application.

Finally, you can specify a particular identity to use for all authenticated requests

With this setting, all the requests are made as the specified user (Assuming that the password it correct in the configuration file). So, for e.g. you can designate a user for the single application, & use that user's identity every time someone authenticates to the application. The main drawback to this method is that you must embed the user's password

In the web.config file in the plain text. Although the ASP.NET won't allow anyone to download this file, this is still a security risk if anyone can get the file by some other means.


Related Discussions:- How does authorization work in asp.net ?

Write a program of changing string order – c# program, Write a Program of C...

Write a Program of Changing String Order - C# Language  using System;   class Prog3_2  {       public static void Main(String [] args)    {     Console.Write(ar

What is the concept of strong names, concept of strong names Strong nam...

concept of strong names Strong name is similar to GUID(It is supposed to be unique in space and time) in the COM components.Strong Name is only needed when we need to deploy as

Emr onc mu2 certification, EMR ONC MU2 CERTIFICATION Project Description...

EMR ONC MU2 CERTIFICATION Project Description: We are looking for someone with experience in EMR MU2 certification per ONC needs. If you have experience and participate in

Use of resource manager class, What's the use of resource manager class? ...

What's the use of resource manager class? The ResourceManager class helps us to read the resource files and get the values by using key. At First you require to create the obje

Calculate standard deviation - c# program, Calculate Standard Deviation - C...

Calculate Standard Deviation - C# Program Hello i am unable to find the code for Calculate Standard Deviation in c#. Can anybody please provide me the assignment help?

What is an object, What is an object? They are instance of classes. It ...

What is an object? They are instance of classes. It is a basic unit of a system. An object is an entity that has attributes, behavior, and identity. Attributes and behavior of

Benefits and limitation of viewstate for state management, What are benefit...

What are benefits and Limitation of using Viewstate for state management The benefits of using Viewstate are as follows:- 1)    There is no server resources required because

Data set and data reader, What is difference between data set and data read...

What is difference between data set and data reader? Some major differences between dataset and datareader are as folows :- 1) The DataReader gives forward-only and read-onl

Develop a google map fix .net site on android, I have to develop a Google M...

I have to develop a Google Map Fix .NET Site on Android(maybe Cross Browser issue) Project Description: A developer has implemented a characteristic which involves data from

Want a database management app, Project Description: Overview: Prepar...

Project Description: Overview: Prepare Windows program that runs in the background and on start up on the client's computer that grabs CERTAIN data from a.SDF file (SQL Serve

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd