L
- LDAP (Lightweight Directory Access Protocol), How To: Use Forms Authentication with Active Directory, Configure the Web Application for Forms Authentication, Develop LDAP Authentication Code to Look Up the User in Active Directory
- (see also )
- authentication code, Configure the Web Application for Forms Authentication
- group retrieval code, Develop LDAP Authentication Code to Look Up the User in Active Directory
- least privileged accounts, Design Principles, Custom Authentication, Using the ASP.NET Process Identity, Use a Least-Privileged Custom Account, Using the ASP.NET Process Identity, The Database Trusts Different Roles, Additional Best Practices, How To: Create a Custom Account to Run ASP.NET, How To: Create a Custom Account to Run ASP.NET, ASP.NET Worker Process Identity, ASP.NET Worker Process Identity, Summary, Assign NTFS Permissions, Configure ASP.NET to Run Using the New Account
- ASP.NET worker process identity and, Custom Authentication, How To: Create a Custom Account to Run ASP.NET
- assigning minimum privileges, Summary
- assigning NTFS permissions, Assign NTFS Permissions
- configuring ASP.NET for, Configure ASP.NET to Run Using the New Account
- creating custom, Using the ASP.NET Process Identity, Using the ASP.NET Process Identity, How To: Create a Custom Account to Run ASP.NET
- creating custom database, The Database Trusts Different Roles
- Enterprise Services and custom, Use a Least-Privileged Custom Account
- impersonating fixed identities, ASP.NET Worker Process Identity
- issues, ASP.NET Worker Process Identity
- principle of, Design Principles
- SQL code and, Additional Best Practices
- libraries., How To: Create a DPAPI Library (see , )
- library applications, Enterprise Services, More Information, More Information, Gatekeepers and Gates, Gatekeepers and Gates, Security for Server and Library Applications, Configure Authorization (Component-Level Access Checks), Security Concepts, Security Concepts
- authentication and, More Information, Gatekeepers and Gates, Security Concepts
- authorization and, Configure Authorization (Component-Level Access Checks)
- security for, Security for Server and Library Applications
- server applications vs., More Information, Gatekeepers and Gates, Security Concepts
- Lightweight Directory Access Protocol., How To: Use Forms Authentication with Active Directory (see )
- load balancing, Choosing Between IPSec and SSL, Disadvantages
- local accounts, Avoid Running as SYSTEM, Using the ASP.NET Process Identity, Summary
- ASPNET as, Avoid Running as SYSTEM
- (see also )
- creating, Summary
- mirrored, Using the ASP.NET Process Identity
- local resources, impersonation and, More Information
- Local Security Authority (LSA), Avoid Running as SYSTEM, Implementing Mirrored ASPNET Process Identity, Storing Database Connection Strings Securely
- Local Security Policy tool, IPSec, Summary, Summary
- locking configuration settings, Secure Resources
- logging., Design Principles, Choose the Identities Used for Resource Access, Accessing System Resources, Windows Security Logs, SQL Server Auditing
- (see also )
- event logs, Design Principles, Accessing System Resources
- IIS, SQL Server Auditing
- troubleshooting with, Windows Security Logs
- logical tiers, Logical Tiers
- logical volumes, storing files on, Options for Storing Secrets in ASP.NET
- Login method, Hosting in a Windows Service
- logon auditing, Auditing, Windows Security Logs
- logon credentials., Authentication (see )
- logon Web forms, ASP.NET Authentication Modes, Development Steps for Forms Authentication, Authorize the User Based on User Name or Role Membership, Using Forms Authentication, Create a Web Application with a Logon Page, Requirements, Requirements
- creating, Development Steps for Forms Authentication, Create a Web Application with a Logon Page, Requirements, Requirements
- Forms authentication and, ASP.NET Authentication Modes
- implementation guidelines, Authorize the User Based on User Name or Role Membership
- troubleshooting, Using Forms Authentication
- LogonUser API, Avoid Running as SYSTEM, Using a Serviced Component, Using the Current Process Identity, More Information, Accessing Network Resources, Connecting to SQL Server Using Windows Authentication
- LSA (Local Security Authority), Avoid Running as SYSTEM, Implementing Mirrored ASPNET Process Identity, Storing Database Connection Strings Securely
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.