U

UDL files, connection strings in, Using DPAPI Directly from ASP.NET
UDP (User Data Protocol), Authentication
UNC (Universal Naming Convention) file shares, Secure Resources, Using the Original Caller
unmanaged code, Security for Server and Library Applications
URL authorization, More Information, Gatekeepers and Gates, Using .NET Roles, ASP.NET Security Architecture, ASP.NET Security Architecture, Windows Authentication with Impersonation, Configurable Security, Configurable Security, Configure ASP.NET Settings, Platform/Transport Security Architecture, Configurable Security, Configurable Security, ASP.NET and the HTTP Channel
.NET remoting, ASP.NET and the HTTP Channel
.NET roles and, Using .NET Roles
ASP.NET security, More Information, Gatekeepers and Gates, ASP.NET Security Architecture, ASP.NET Security Architecture, Platform/Transport Security Architecture
configuring, Configure ASP.NET Settings
Forms authentication, Configurable Security
Windows authentication with impersonation, Windows Authentication with Impersonation, Configurable Security
Windows authentication without impersonation, Configurable Security, Configurable Security
User Data Protocol (UDP), Authentication
User Manager, Accessing Network Resources, Using the Anonymous Internet User Account, Using the ASP.NET Process Identity
user names., The Foundations, Authentication, Authorize the User Based on User Name or Role Membership, Avoid Running as SYSTEM
(see also )
authentication and, The Foundations
(see also )
authorization and, Authorize the User Based on User Name or Role Membership
for ASPNET account, Avoid Running as SYSTEM
user profiles, Web Farm Considerations, Advantages, Storing Database Connection Strings Securely, Using DPAPI from Enterprise Services, Notes, Create a Windows Account to Run the Enterprise Services Application and Windows Service
User Services layer, Logical Tiers
user store, DPAPI with, Storing Database Connection Strings Securely, Machine Store vs. User Store, Machine Store vs. User Store, How To: Create a DPAPI Library, How To: Use DPAPI (User Store) from ASP.NET with Enterprise Services, How To: Use DPAPI (User Store) from ASP.NET with Enterprise Services, Notes, Why Use Enterprise Services?, Requirements, Requirements, Create a Serviced Component that Provides Encrypt and Decrypt Methods, Call the Managed DPAPI Class Library, Call the Managed DPAPI Class Library, Create a Windows Account to Run the Enterprise Services Application and Windows Service, Configure, Strong Name, and Register the Serviced Component, Create a Windows Service Application that will Launch the Serviced Component, Create a Windows Service Application that will Launch the Serviced Component, Write a Web Application to Test the Encryption and Decryption Routines
(see also )
calling managed DPAPI class library, Create a Serviced Component that Provides Encrypt and Decrypt Methods
configuring, strong naming, and registering serviced component, Create a Windows Account to Run the Enterprise Services Application and Windows Service
creating dummy class to launch serviced component, Call the Managed DPAPI Class Library
creating serviced components with encryption and decryption methods, Requirements
creating Web application to test encryption and decryption, Create a Windows Service Application that will Launch the Serviced Component
creating Windows account for Enterprise Services application and Windows service, Call the Managed DPAPI Class Library
creating Windows service to launch serviced component, Configure, Strong Name, and Register the Serviced Component
Enterprise Services and, Machine Store vs. User Store
installing and starting Windows service, Create a Windows Service Application that will Launch the Serviced Component
issues, How To: Use DPAPI (User Store) from ASP.NET with Enterprise Services
machine store vs., Storing Database Connection Strings Securely, How To: Create a DPAPI Library
modifying Web application to read encrypted connection string from Web.config file, Write a Web Application to Test the Encryption and Decryption Routines
requirements, Requirements
using Enterprise Services, Notes
using Windows service, Why Use Enterprise Services?
user-defined database roles, Authorization
users, The Foundations, The Foundations, Design Principles, Logical Tiers, Authentication, ASP.NET and HttpContext.User, An Authorization Pattern, Windows Authentication, Using a Serviced Component, Accessing Non-Windows Network Resources, Web Farm Considerations, Identifying Callers, Configure ASP.NET Settings, Advantages, Storing Database Connection Strings Securely, Using DPAPI from Enterprise Services, SQL Injection Attacks, Notes, Create a Windows Account to Run the Enterprise Services Application and Windows Service
(see also , )
accounts., ASP.NET and HttpContext.User (see )
anonymous Internet account, Using a Serviced Component
authenticating and authorizing, The Foundations
(see also )
identifying authenticated, Windows Authentication
input., Design Principles (see )
interactive, and Enterprise Services, Identifying Callers
malicious Web, Accessing Non-Windows Network Resources, Configure ASP.NET Settings
names., Authentication (see )
profiles, Web Farm Considerations, Advantages, Storing Database Connection Strings Securely, Using DPAPI from Enterprise Services, Notes, Create a Windows Account to Run the Enterprise Services Application and Windows Service
putting, into roles, An Authorization Pattern
unfiltered input, SQL Injection Attacks
User Services layer, Logical Tiers
Users and Computers Administration tool, Register Serviced Components
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.110.155