473,387 Members | 1,495 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

how to avoid authentication

Hi

All users should authenticate to reach
some page. How to avoid this for some users.

Thanks
Konrad
Nov 17 '05 #1
1 2926
Hello Konrad,
It depends which type of authentication you are using. If it is Windows
Authentication, you might need
to create a Windows Groups and allow that group access, and the others
require authentication.
If you are using Form Authentication, you might need to use Role
Authentication.
Role-based security in ASP.NET is similar to the role-based security that
Microsoft COM+ and
Microsoft Transaction Server (MTS) use, although there are important
differences. Role-based
security in ASP.NET is not limited to Windows accounts and groups. For
example, if Windows
authentication and impersonation is enabled, the identity of the user is a
Windows identity
(User.Identity.Name = "Domain\username"). You can check identities for
membership in specific roles and restrict access accordingly. For example:
If User.IsInRole("BUILTIN\Administrators") Then
Response.Write("You are an Admin")
Else If User.IsInRole("BUILTIN\Users") then
Response.Write("You are a User")
Else
Response.Write("Invalid user")
End if
If you are using Forms authentication, roles are not assigned to the
authenticated user; you must do this programmatically. To assign roles to
the
authenticated user, use the OnAuthenticate event of the authentication
module (which is the Forms
authentication module in this example) to create a new GenericPrincipal
object and assign it to the
User property of the HttpContext.

For more information, you might refer to the following Kb article:
306590 INFO: ASP.NET Security Overview
http://support.microsoft.com/?id=306590

Thanks,
Bassel Tabbara
Microsoft, ASP.NET

This posting is provided "AS IS", with no warranties, and confers no rights.
--------------------
| From: "Konrad" <ko*******@poczta.onet.pl>
| Newsgroups: microsoft.public.dotnet.framework.aspnet
| Subject: how to avoid authentication
| Date: Wed, 25 Jun 2003 10:41:13 +0200
| Organization: tp.internet - http://www.tpi.pl/
| Lines: 9
| Message-ID: <bd**********@atlantis.news.tpi.pl>
| NNTP-Posting-Host: pj12.szczecin.sdi.tpnet.pl
| X-Trace: atlantis.news.tpi.pl 1056530500 1057 217.98.201.12 (25 Jun 2003
08:41:40 GMT)
| X-Complaints-To: us****@tpi.pl
| NNTP-Posting-Date: Wed, 25 Jun 2003 08:41:40 +0000 (UTC)
| X-Priority: 3
| X-MSMail-Priority: Normal
| X-Newsreader: Microsoft Outlook Express 6.00.3790.0
| X-MimeOLE: Produced By Microsoft MimeOLE V6.00.3790.0
| Path:
cpmsftngxa06.phx.gbl!TK2MSFTNGP08.phx.gbl!newsfeed 00.sul.t-online.de!t-onlin
e.de!news-spur1.maxwell.syr.edu!news.maxwell.syr.edu!newshos ting.com!news-xf
er2.atl.newshosting.com!newsfeed.news2me.com!newsf eed.tpinternet.pl!atlantis
..news.tpi.pl!news.tpi.pl!not-for-mail
| Xref: cpmsftngxa06.phx.gbl microsoft.public.dotnet.framework.aspnet:154667
| X-Tomcat-NG: microsoft.public.dotnet.framework.aspnet
|
| Hi
|
| All users should authenticate to reach
| some page. How to avoid this for some users.
|
| Thanks
| Konrad
|
|
|
Nov 17 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

7
by: Michael Foord | last post by:
#!/usr/bin/python -u # 15-09-04 # v1.0.0 # auth_example.py # A simple script manually demonstrating basic authentication. # Copyright Michael Foord # Free to use, modify and relicense. #...
8
by: Bob Everland | last post by:
I have an application that is ISAPI and the only way to secure it is through NT permissions. I need to have a way to login to windows authentication so that when I get to the ISAPI application no...
6
by: Billy Jacobs | last post by:
I have a website which has both secure and non-secure pages. I want to uses forms authentication. How do I accomplish this? Originally I had my web.config file in the root with Forms...
6
by: harry | last post by:
Hi, I have a program that runs on multiple client pc's. Occasionally one or more of those pc's use VPN to connect to another corporate network. When using VPN they need to set proxy server in...
0
by: zislam | last post by:
Hi: Could anyone pls let me know how can I avoid the windows authentication screen for viewing a report in Reporting Service. TIA Zahir
4
by: Andrew | last post by:
Hey all, I would like to preface my question by stating I am still learning ASP.net and while I am confident in the basics and foundation, the more advanced stuff is still a challenge. Ok....
3
by: Stan SR | last post by:
Hi, I have a problem with the website that I ve published. I get an authentification form. Which parameters I have to update in the web.config to avoid this ? Do I have to modify something in...
2
by: Frank Swarbrick | last post by:
I am trying to understand "client authentication" works. My environment is DB2/UDB LUW 8.2 on zSeries SLES9 as the database server and DB2 for VSE 7.4 as the client. We currently have DB2/LUW set...
0
by: VeeraLakshmi | last post by:
I am doing a project for internet control using Java,PHP and MySql.All sites should go through the proxy server only.We are giving access rights as allow or deny to the sites.If we type the...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.