D
- data access security, Logical Tiers, Physical Deployment Models, Implementation Technologies, More Information, Gatekeepers and Gates, Enterprise Services (COM+) Roles, Web Server to Remote Application Server, Intranet Security, Data Access Security, Data Access Security, SQL Server Gatekeepers, SQL Server Gatekeepers, Trusted Subsystem vs. Impersonation/Delegation, Authorization, Using Multiple Database Roles, Connecting with Least Privilege, The Database Trusts Different Roles, Storing Database Connection Strings Securely, Using the COM+ Catalog, SQL Injection Attacks, Auditing, Auditing
- auditing, Auditing
- authentication, More Information, Trusted Subsystem vs. Impersonation/Delegation
- authorization, Authorization
- creating least privileged accounts, The Database Trusts Different Roles
- Data Services layer, Logical Tiers
- gates, Gatekeepers and Gates
- intranet., Intranet Security (see )
- key issues, Data Access Security
- least privileged connections, Connecting with Least Privilege
- process identity for SQL Server, Auditing
- secure communication, Web Server to Remote Application Server, Using Multiple Database Roles
- SQL injection attacks, SQL Injection Attacks
- SQL Server gatekeepers, SQL Server Gatekeepers
- SQL Server roles, Enterprise Services (COM+) Roles
- storing connection strings, Storing Database Connection Strings Securely
- technologies, Implementation Technologies
- trusted subsystem vs. impersonation/delegation, SQL Server Gatekeepers
- validating user credentials against database stores, Using the COM+ Catalog
- Web servers and, Physical Deployment Models
- Data Encryption Standard (DES), Using Forms Authentication in a Web Farm, How To: Create an Encryption Library
- data integrity, Authorization, Secure Communication, Using Multiple Database Roles, How To: Call a Web Service Using SSL, How To: Use IPSec to Provide Secure Communication Between Two Servers, Certificate Stores
- (see also )
- Data Services layer, Logical Tiers
- data stores., Keys and Certificates (see )
- data, sensitive., Secure Communication (see )
- database connection strings., Modify the Web Application to Read an Encrypted Connection String from Web.Config (see )
- database resources, Authentication and Authorization Design
- database servers., The Foundations, Web Server to Remote Application Server, Security Configuration Steps, Connection String Types
- (see also )
- authentication, The Foundations
- intranet configuration, Security Configuration Steps
- secure communication from application servers to, Web Server to Remote Application Server
- database trust, Connecting with Least Privilege
- database, user account, Connection String Types (see )
- db_owner role, Connection String Types, Connecting with Least Privilege, Additional Best Practices
- DCOM (Distributed COM), Secure Communication, Using IPSec, Analysis, Security Architecture, Development Time vs. Deployment Time Configuration, Use Windows Groups, More Information, Authentication
- authentication levels, Development Time vs. Deployment Time Configuration, Use Windows Groups, Authentication
- Enterprise Services and, Security Architecture
- firewalls and, More Information
- Internet scenario and, Analysis
- RPC encryption and, Secure Communication, Using IPSec
- declarative principal permission demands, Programmatic Security, Configurable Security, Programmatic Security, Configurable Security, Configurable Security
- declarative role checks, Checking Role Membership
- decryption., Keys and Certificates (see , , )
- decryptionKey attribute, Using Forms Authentication in a Web Farm
- default configuration, ASP.NET, Implementing Mirrored ASPNET Process Identity
- default credentials, Passing Credentials for Authentication to Web Services, Flowing the Original Caller, Accessing Network Resources, Flowing the Original Caller
- default domain, Basic Authentication
- default security settings, Design Principles
- delegation., Authentication, Choose the Identities Used for Resource Access, Disadvantages of the Trusted Subsystem Model, Disadvantages of the Trusted Subsystem Model
- (see also )
- authentication and, Choose the Identities Used for Resource Access
- impersonation and, Disadvantages of the Trusted Subsystem Model
- (see also )
- Kerberos., Authentication (see )
- demilitarized zone (DMZ), Physical Deployment Models, Key Notes
- deployment, Physical Deployment Models, Know What to Secure, Development Time vs. Deployment Time Configuration, Versioning
- configuration upon, Development Time vs. Deployment Time Configuration
- serviced component, Versioning
- Web application, Physical Deployment Models, Know What to Secure
- DES (Data Encryption Standard), Using Forms Authentication in a Web Farm, How To: Create an Encryption Library
- design principles, Design Principles
- development time configuration, Development Time vs. Deployment Time Configuration
- Digest authentication, Authentication, ASP.NET Identity Matrix
- digests, password, How To: Use Forms Authentication with SQL Server 2000
- directory traversal bugs, Options for Storing Secrets in ASP.NET
- directory, active., How To: Implement Kerberos Delegation for Windows 2000 (see )
- directory, virtual., Create a Simple Web Application (see )
- distributed Web applications., Security Model for ASP.NET Applications (see )
- DLL locking problems, RPC Encryption
- Dllhost.exe, Security Architecture, Identifying Callers
- DllImport attribute, Flowing the Original Caller
- DMZ (demilitarized zone), Physical Deployment Models, Key Notes
- domain accounts, More Information, Using the ASP.NET Process Identity
- anonymous, More Information
- custom, Using the ASP.NET Process Identity
- domain controllers, ASP.NET process account and, Avoid Running as SYSTEM
- domain, default, Basic Authentication
- double dash (--), Anatomy of a SQL Script Injection Attack
- downloading of files, preventing, Locking Configuration Settings
- DPAPI (Data Protection API), Options for Storing Secrets in ASP.NET, Web Farm Considerations, Storing Database Connection Strings Securely, Storing Database Connection Strings Securely, Storing Database Connection Strings Securely, Machine Store vs. User Store, Using DPAPI from Enterprise Services, How To: Create a DPAPI Library, How To: Create a DPAPI Library, How To: Use DPAPI (Machine Store) from ASP.NET, How To: Use DPAPI (User Store) from ASP.NET with Enterprise Services
- libraries., How To: Create a DPAPI Library (see )
- LSA vs., Storing Database Connection Strings Securely
- machine store vs. user store, Storing Database Connection Strings Securely, How To: Create a DPAPI Library
- storing database connection strings using, Storing Database Connection Strings Securely
- storing secrets, Options for Storing Secrets in ASP.NET
- Web farms and, Web Farm Considerations
- with machine store, Using DPAPI from Enterprise Services, How To: Use DPAPI (Machine Store) from ASP.NET
- with user store, Machine Store vs. User Store, How To: Use DPAPI (User Store) from ASP.NET with Enterprise Services
- DPAPI libraries, How To: Create a DPAPI Library, How To: Create a DPAPI Library, Notes, Notes, Create a C# Class Library, Create a Serviced Component that Provides Encrypt and Decrypt Methods
- calling managed, Create a Serviced Component that Provides Encrypt and Decrypt Methods
- creating C# class library, Notes
- issues, How To: Create a DPAPI Library
- requirements, Notes
- strong naming assemblies, Create a C# Class Library
- duplicated accounts, Intranet Security, Extranet Security, Internet Security
- dynamic cloaking, Impersonation
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.