Various ways of authentication techniques in asp.net, DOT NET Programming

Assignment Help:

What are the various ways of authentication techniques in ASP.NET?

The Selection of  an authentication provider is as simple as making an entry in  the web.config file of  the application. You can use one of the entries to select the corresponding built in the authentication provider:

1)   

2)   

3)     

4)    The Custom authentication where you might install an ISAPI filter in IIS which compares incoming requests to the list of source IP addresses, & considers requests to be authenticated if they come from an acceptable address. In that situation, you would set the authentication mode to none to secure any of the .net authentication providers from being triggered.

Windows authentication and IIS

If you choose windows authentication for your ASP.NET application, you also have to configure authentication within the IIS. As the IIS provides Windows authentication. The IIS gives you a choice for four different authentication methods:

Anonymous, digest, basic & windows integrated.

If you choose anonymous authentication, The IIS doesn't perform any authentication, anyone is allowed to access the ASP.NET application.

If you choose basic authentication, users must provide a windows username and password to connect. However this information is sent over the network in the clear text that makes basic authentication very much insecure over the internet.

If you choose digest authentication, users should still provide a windows user name and password to connect. However password is hashed before it is sent across the network. The Digest authentication needs that all users be running Internet Explorer 5 or latest and that windows accounts to stored in active directory.

If you choose windows integrated authentication, the passwords never cross the network. The Users must still have a username and password, but the application uses either the Kerberos or challenge/response protocols authenticate the user. The Windows-integrated authentication requires that all users be running internet explorer 3.01 or latest Kerberos is a network authentication protocol. It is designed to provide a strong authentication for client/server applications by using the secret-key cryptography. The Kerberos is a solution to network security problems. It gives the strong cryptography & tools of authentication over the network to help to secure the information in systems across entire enterprises.

Passport authentication

The Passport authentication lets you to use Microsoft's passport service to authenticate users of your application. If your users have signed up with the passport, & you configure the authentication mode of the application to the passport authentication, all the authentication duties are off-loaded to the passport servers.

The Passport uses an encrypted cookie process to indicate the authenticated users. If users have already signed into passport when they visit your site, they will be considered authenticated by the ASP.NET. Otherwise they will be redirected to the passport servers to log in. Whenever they successfully log in, they'll be redirected back to your site.

To use passport authentication you have to download the Passport Software Development Kit (SDK) and install it on your server. The SDK can be found at https:// msdn.microsoft.com/library/default.asp?url=/downloads/list/websrvpass.aps. It includes full details of implementing passport authentication in your own applications.

Forms authentication

The Forms authentication process provides you with a way to handle authentication using your own custom logic within an ASP.NET application.

If you choose forms authentication the following applies.

1) Whenever a user requests a page for the application, the ASP.NET checks for the presence of a special session cookie. If the cookie is present, ASP.NET assumes that the user is authenticated and processes the request.

2) If the cookie is not present, the ASP.NET redirects the user to a web form you provide.

You can take out whatever authentication, it check's you like it checks your form. Whenever the user is authenticated, you indicate this to ASP.NET by fixing a property, which creates the special cookie to handle subsequent requests.


Related Discussions:- Various ways of authentication techniques in asp.net

Program of nested loop - c# program, Program of Nested Loop - C# Program ...

Program of Nested Loop - C# Program I am a learner of C# language and i am struggling with the Loops in c#. Can you have any code examples for this.

Perform transactions in .net, How can we perform transactions in .NET? ...

How can we perform transactions in .NET? The common sequence of steps that would be performed for developing a transactional application is as follows: 1)In the first step o

Published or precreated objects in remoting, What is fundamental of publish...

What is fundamental of published or precreated objects in Remoting? In the scenarios of the singleton or single call the objects are created dynamically. But in some situations

What are the benefits of using of ado.net in .net 4.0, What are the benefit...

What are the benefits of using of ADO.NET in .NET 4.0. The following are the benefits of using ADO.NET in .NET 4.0 are as follows: Language-Integrated Query (LINQ) - Adds

Rewrite and redirect rules using codebehind, VB.net Rewrite and Redirect Ru...

VB.net Rewrite and Redirect Rules using CodeBehind Project Description: Need VB.net programmer to make some (hopefully) minor code edits to resolve some site issues. I will p

I need asp.net developer, I am seeking asp.net developers, and will raise d...

I am seeking asp.net developers, and will raise depends on skills and work, we are a web development firm in mexico and i want full time developers that can focus 100 percent my pr

Data validation application in asp.net, Project Description: i have pred...

Project Description: i have predefined template which contains all my user details and there order details We have to create a login where a user uploads data. Mobile  Nam

Difference between shadowing and overriding, What is the difference between...

What is the difference between Shadowing and Overriding? The main basic difference between shadowing and overriding are as follows:- 1) The Overriding redefines only the imp

Scavenging, What is scavenging? When server running your ASP.NET applic...

What is scavenging? When server running your ASP.NET application runs low on the memory resources, items are discarded from the cache depending on cache item priority. The Cach

Sequence in which asp.net events are processed, What' is the sequence in wh...

What' is the sequence in which ASP.NET events are processed? The sequence in which the ASP.NET events occur are as folows :- 1.     Page_Init. 2.     Page_Load. 3.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd