473,396 Members | 2,024 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Identifying calling user with custom authentication

Hi

I've searched through this newsgroup but have been unable to find
something to answer my question so I'd better go ahead and post it

We are currently developing a web service for processing requests on a
business domain. We are interested in utilizing a custom authentication
against a user database so we are looking into the WSE 3.0 scenarios
and their samples. Once a user is authenticated the request is handled
if the user has sufficient priviliges and the actions are logged in an
audit trail.

What is puzzling me is how to inter-connect the authentication against
a user database with the actual code processing the request? That is,
how can I programmatically in the WebMethod get a hold of the
authenticated user (not the user running the web service on the
machine, but the user which was authenticated against the user
database).

I've looked into the Context object and even the Thread object, but I
can't seem to figure out what I need to do in my custom authentication
method to store some user-id/user object which can be retreived in the
WebMethod....

Any pointers on where to look or am I trying to do something that can't
be done?

Oct 6 '06 #1
1 1336
"Enemaerke" <so*************@gmail.comwrote in message
news:11**********************@i3g2000cwc.googlegro ups.com...
Hi

I've searched through this newsgroup but have been unable to find
something to answer my question so I'd better go ahead and post it

We are currently developing a web service for processing requests on a
business domain. We are interested in utilizing a custom authentication
against a user database so we are looking into the WSE 3.0 scenarios
and their samples. Once a user is authenticated the request is handled
if the user has sufficient priviliges and the actions are logged in an
audit trail.

What is puzzling me is how to inter-connect the authentication against
a user database with the actual code processing the request? That is,
how can I programmatically in the WebMethod get a hold of the
authenticated user (not the user running the web service on the
machine, but the user which was authenticated against the user
database).

I've looked into the Context object and even the Thread object, but I
can't seem to figure out what I need to do in my custom authentication
method to store some user-id/user object which can be retreived in the
WebMethod....

Any pointers on where to look or am I trying to do something that can't
be done?
I haven't tried this myself, but web services use the ASP.NET framework. So
take a look at Request.User and the IPrincipal and IIdentity interfaces.

John
Oct 6 '06 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Carl J. Hixon | last post by:
I am setting up a web site and have questions about security. I would like to use a forum script like phpBB, I would also like to use a CMS package like Mambo, and a file sharing system. Since I...
0
by: Michael Brandt Lassen | last post by:
Hi gurus This problem is about calling Web services secured by Forms Authentication from Windows Forms user controls embedded in HTML. Using the object tag I’ve managed to include a Windows...
1
by: anonymous | last post by:
Hi all, I've been searching the way to achieve the following task. But no luck so far. I have a web site(main site), which requires authentication. This authentication is set at Windows...
3
by: Webdiyer | last post by:
I want to integrate SecurID two-factor authentication system of the RSASecurity.inc into our asp.net application,but I get into trouble when trying to call the API functions of the ACE Agent,I got...
6
by: Tapi | last post by:
Hello, I can easily get the Windows login of the current user on my machine by using: User_login = HttpContext.Current.User.Identity.Name() However once, I copy the aspx and...
3
by: bwmbagus | last post by:
I am getting a strange result from some standard code. Anyone got any ideas?? The puzzle I have a web service calling System.Environment.UserName etc to return the user name from the server....
3
by: Asaf | last post by:
Hello, I have created a web service name "TestWS" and published it to my SBS2003 server that uses IIS6 as a web server. I have set NO anonymous access to TestWS virtual directory and I have...
10
by: Frankie | last post by:
It appears that System.Random would provide an acceptable means through which to generate a unique value used to identify multiple/concurrent asynchronous tasks. The usage of the value under...
4
by: alexandis | last post by:
There are tons of articles about custom role and provider membership, but they just tear me apart and confuse :( The situation is following: I use DB2, so I wrote custom role + membership...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.