473,404 Members | 2,137 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,404 software developers and data experts.

Access dot not web app from outside and inside firewall?

We are developing a web app that will be used by emloyees (from our internal
network inside the firewall) and by non-employees (from outside our network
and firewall). We'd like to be able to authenticate users based on this fact.
In other words internal users will be authenticated based on their existing
Windows login id, whereas external users will go thru a login process. After
this, the objects controlling the users roles should be the same. Has anyone
solved these problems and can offer any tips? It seems like something that
many organizations would encounter.
Nov 3 '06 #1
1 969
Lots of discussion on mixed mode authentication, start here:

http://www.15seconds.com/Issue/050203.htm

--
--
Regards

John Timney (MVP)
VISIT MY WEBSITE:
http://www.johntimney.com
http://www.johntimney.com/blog
"mscertified" <ru****@tigerlily.comwrote in message
news:AB**********************************@microsof t.com...
We are developing a web app that will be used by emloyees (from our
internal
network inside the firewall) and by non-employees (from outside our
network
and firewall). We'd like to be able to authenticate users based on this
fact.
In other words internal users will be authenticated based on their
existing
Windows login id, whereas external users will go thru a login process.
After
this, the objects controlling the users roles should be the same. Has
anyone
solved these problems and can offer any tips? It seems like something that
many organizations would encounter.

Nov 3 '06 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: Chuck | last post by:
Here is my setup. Netgear Router with a webserver and database server NAT'd behind the firewall. Microsoft Windows 2000, IIS 5 - Web Server Microsoft Windows 2000, MySQL - Database Server ...
4
by: Dean J. Garrett | last post by:
I have a site which offers documents (.doc, .pdf, etc.) for download. The user clicks on the link and is able to download the file or open it. What if the source location of the document is behind...
3
by: Jose Mariscal | last post by:
I know this was posted earlier, but I am re-posting it due ot my failure to provide certain info. I appreciate any and all help concerning this! We have web server A, sitting outside out firewall...
6
by: dstewart | last post by:
I have 2 Suse 9.1 boxes with similar configurations. I'm in the process of moving some PHP code from one server (192.168.0.100) to another (192.168.0.102). MySQL is running on each server, and...
10
by: John | last post by:
Hi I am using ms internet control in my app. It works fine form all machines except from a new one which has win xp sp2 installed. All machines are part of a small business server 2003 domain so...
6
by: TS | last post by:
What are the options if I have a web server outside a firewall used as the presentation layer, and it needs to contact an app server located inside the firewall? I know I got web services and...
1
by: David Gómez Gómez | last post by:
I have a web app running con COMPUTER1 called Proyectos. In web.config i have windows integrated authentication and: <authorization> <allow users="COMPUTER1\John" /> <allow users="COMPUTER1\Liz"...
7
by: Randy Yates | last post by:
Is opening up port 5432 (R/W both directions) all that is required of a firewall in order to access a postgres database outside the firewall? -- % Randy Yates % "My Shangri-la...
3
by: Suresh P | last post by:
Hi All, I tried to access the mysql database in ODBC using ip address and username/password. It returns, "cannot connect to MySQL server on IP ADDRESS(10060)". This could be related to Firewall...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.