L

LDAP (Lightweight Directory Access Protocol), How To: Use Forms Authentication with Active Directory, Configure the Web Application for Forms Authentication, Develop LDAP Authentication Code to Look Up the User in Active Directory
(see also )
authentication code, Configure the Web Application for Forms Authentication
group retrieval code, Develop LDAP Authentication Code to Look Up the User in Active Directory
least privileged accounts, Design Principles, Custom Authentication, Using the ASP.NET Process Identity, Use a Least-Privileged Custom Account, Using the ASP.NET Process Identity, The Database Trusts Different Roles, Additional Best Practices, How To: Create a Custom Account to Run ASP.NET, How To: Create a Custom Account to Run ASP.NET, ASP.NET Worker Process Identity, ASP.NET Worker Process Identity, Summary, Assign NTFS Permissions, Configure ASP.NET to Run Using the New Account
ASP.NET worker process identity and, Custom Authentication, How To: Create a Custom Account to Run ASP.NET
assigning minimum privileges, Summary
assigning NTFS permissions, Assign NTFS Permissions
configuring ASP.NET for, Configure ASP.NET to Run Using the New Account
creating custom, Using the ASP.NET Process Identity, Using the ASP.NET Process Identity, How To: Create a Custom Account to Run ASP.NET
creating custom database, The Database Trusts Different Roles
Enterprise Services and custom, Use a Least-Privileged Custom Account
impersonating fixed identities, ASP.NET Worker Process Identity
issues, ASP.NET Worker Process Identity
principle of, Design Principles
SQL code and, Additional Best Practices
libraries., How To: Create a DPAPI Library (see , )
library applications, Enterprise Services, More Information, More Information, Gatekeepers and Gates, Gatekeepers and Gates, Security for Server and Library Applications, Configure Authorization (Component-Level Access Checks), Security Concepts, Security Concepts
authentication and, More Information, Gatekeepers and Gates, Security Concepts
authorization and, Configure Authorization (Component-Level Access Checks)
security for, Security for Server and Library Applications
server applications vs., More Information, Gatekeepers and Gates, Security Concepts
Lightweight Directory Access Protocol., How To: Use Forms Authentication with Active Directory (see )
load balancing, Choosing Between IPSec and SSL, Disadvantages
local accounts, Avoid Running as SYSTEM, Using the ASP.NET Process Identity, Summary
ASPNET as, Avoid Running as SYSTEM
(see also )
creating, Summary
mirrored, Using the ASP.NET Process Identity
local resources, impersonation and, More Information
Local Security Authority (LSA), Avoid Running as SYSTEM, Implementing Mirrored ASPNET Process Identity, Storing Database Connection Strings Securely
Local Security Policy tool, IPSec, Summary, Summary
locking configuration settings, Secure Resources
logging., Design Principles, Choose the Identities Used for Resource Access, Accessing System Resources, Windows Security Logs, SQL Server Auditing
(see also )
event logs, Design Principles, Accessing System Resources
IIS, SQL Server Auditing
troubleshooting with, Windows Security Logs
logical tiers, Logical Tiers
logical volumes, storing files on, Options for Storing Secrets in ASP.NET
Login method, Hosting in a Windows Service
logon auditing, Auditing, Windows Security Logs
logon credentials., Authentication (see )
logon Web forms, ASP.NET Authentication Modes, Development Steps for Forms Authentication, Authorize the User Based on User Name or Role Membership, Using Forms Authentication, Create a Web Application with a Logon Page, Requirements, Requirements
creating, Development Steps for Forms Authentication, Create a Web Application with a Logon Page, Requirements, Requirements
Forms authentication and, ASP.NET Authentication Modes
implementation guidelines, Authorize the User Based on User Name or Role Membership
troubleshooting, Using Forms Authentication
LogonUser API, Avoid Running as SYSTEM, Using a Serviced Component, Using the Current Process Identity, More Information, Accessing Network Resources, Connecting to SQL Server Using Windows Authentication
LSA (Local Security Authority), Avoid Running as SYSTEM, Implementing Mirrored ASPNET Process Identity, Storing Database Connection Strings Securely
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.143.205.136