473,396 Members | 1,879 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Identify the source of the request

Hi Guys,

I have a people soft application where a hyperlink is added for an Asp.net webapplication. Is there any way so that i can restrict my webapplication access to the calls only from people soft.

The people soft is running on a web Server, i thought of getting the peoplesoft server IP and put that in webconfig. so that i can compare the incoming IP using Request.servervariables("host_name") with the people soft IP. If both of them matches then allow the access. But there is a chance that the IP may change.

Is there any better way to get the identity so that access can be restricted to only peoplesoft users.
Nov 14 '09 #1
1 2193
Frinavale
9,735 Expert Mod 8TB
Are you talking about PeopleSoft By Oracle?

I don't really know how you would achieve what you want.
You could maybe create your own forms authentication system based on the PeopleSoft user base. I would contact Oracle and ask them if there is a way for developers to access the PeopleSoft user store in order accomplish this...


-Frinny
Nov 14 '09 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

1
by: Thug Passion | last post by:
Hi, I've written a type of web spider; now I'd like it to identify itself to servers it crawls over. I'm using VB.NET 2003, XP Home, and a (desktop) Windows Forms app. I'm using the...
4
by: Iftikhar Hussain | last post by:
Hello Everyone Nice to be back here, well all u guys have helped in past & now I would like a favor again. first what i want to develop is as follows: An application for rescue station, where...
2
by: Manu | last post by:
To login into my web site the user has to supply a username and a password. As the application is a commercial one I would like to enable the customer to connect to the site only from the machine...
7
by: Amadelle | last post by:
Hi all and thanks in advance, I am stuck! I can't figure out how to identify which button was clicked on my ASP.NET page in the PostBack event? So what I am trying to do is to is to have an if...
3
by: cliffeh | last post by:
I have an Intranet application that I'm deploying to our Shop Floor. What I would like is to have a front page that receives the request, identifies the computer that it's coming from, and then...
4
by: Goh | last post by:
Hi, I would like to know how can we implement a web page that intelligent enough to unique identify that pc have been visit before without any cookies and login user require. I have try...
2
by: Mike Kansky | last post by:
Scenario: 2 Computers on the network going through proxy (same ip/hostname). Both do not accept any kind of cookies. Visiting web site that needs to supply different content to each of this...
2
by: William LaMartin | last post by:
Does anyone have a method of determining if a visitor to a web page is using a Palm or Blackberry mobile device? With the code below, I can easily identify a Window CE, Pocket PC or Window...
6
by: Pieter | last post by:
Hi, For some procedures that throws exceptions, I would like to show different messages to the user depending on what type of exception he's getting. For instance this one: when the file is...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.