1 / 10

Configuring Authentication, Authorization, and Impersonation

Configuring Authentication, Authorization, and Impersonation. LESSON 5.1. 98-363 Web Development Fundamentals. Lesson Overview In this lesson, you will review: The various authentication schemes that can be used in a Web application The difference between Authentication vs. Authorization.

keelty
Download Presentation

Configuring Authentication, Authorization, and Impersonation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Configuring Authentication, Authorization, and Impersonation LESSON 5.1 98-363 Web Development Fundamentals

  2. Lesson Overview • In this lesson, you will review: • The various authentication schemes that can be used in a Web application • The difference between Authentication vs. Authorization

  3. Authentication vs. Authorization Authorization Accepts credentials from the user Validates the credentials Authentication Given the authentication credentials supplied, determines the right to access a resource Assign authorization by user name or by role

  4. Authentication Methods • Windows-based: • Relies on the Windows OS and IIS • User requests a secure Web page and the request goes through IIS • Once credentials are verified by IIS, the secure Web page is returned • Forms-based: • Unauthenticated request are redirected to an HTML form • User provides credentials and submits the HTML form • After credentials are verified, an authorization cookie is issued

  5. Comparison of the ASP.NET Authentication Methods

  6. Enabling Windows-Based Authentication

  7. After authentication, the Web server reads the user identity

  8. Forms-Based Authentication

  9. How to Enable Forms-Based Authentication

  10. Assignment • Complete Student Activity 5.1 • You may work in a group but are responsible for your own work • Turn in the completed assignment to your instructor for review

More Related