473,775 Members | 2,392 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Authentication methods

Hello,

I am looking for some help with user authentication. I need (if there
is something like this) tutorials with different ways, how to make
user authentication.

Users->roles->rights

user - n* roles - n* rights

Or something about ACL O_o

Uff thx for help
Dec 11 '07 #1
5 1579
reflex wrote:
Hello,

I am looking for some help with user authentication. I need (if there
is something like this) tutorials with different ways, how to make
user authentication.

Users->roles->rights

user - n* roles - n* rights

Or something about ACL O_o

Uff thx for help
Hi Reflex,

ARe you looking for some guidelines on how to roll your own, or are
youlooking for a ready-to-go solution (if such a thing exists).
I could help you going with the first.
Are you familiar with databases?

Regards,
Erwin Moller
Dec 12 '07 #2
On 12 Gru, 00:40, reflex <reflexa...@gma il.comwrote:
Hello,

I am looking for some help with user authentication. I need (if there
is something like this) tutorials with different ways, how to make
user authentication.

Users->roles->rights

user - n* roles - n* rights

Or something about ACL O_o

Uff thx for help
For ACL try PHPGAcl:

http://phpgacl.sourceforge.net/

Manual explain very good idea of ACL.
Dec 12 '07 #3
Hi,
>>ARe you looking for some guidelines on how to roll your own, or are
youlooking for a ready-to-go solution (if such a thing exists).

I am looking for some tutorial or guide, i can make whole scripts with
data saved in databases, but i need some help with how to find out if
some user have rights to do something :), or which way to use to store
users rights.

Example:

User: Andy
Role: amdin
Rights: news_read, news_edit, news_delete, users etc...

User: Jack
Role: news_editor, user_editor
Rights: news_read, news_edit, user_read, user_edit

I find something about ACL and using bitwise technique :DD
>For ACL try PHPGAcl:
Yeah, i hope i will learn something from it :)

Thx
Dec 12 '07 #4
Greetings, reflex.
In reply to Your message dated Wednesday, December 12, 2007, 02:40:28,
I am looking for some help with user authentication. I need (if there
is something like this) tutorials with different ways, how to make
user authentication.
Users->roles->rights
user - n* roles - n* rights
Or something about ACL O_o
User rights have nothing to the user authentificatio n.
And roles is the rights applied to the users.
So Your post is wrong in many ways.

ACL is stands for Access Control List (pretty self-explanatory, it is list
binding users to the rights, thus defining user roles)
--
Sincerely Yours, AnrDaemon <an*******@free mail.ru>

Dec 12 '07 #5
User rights have nothing to the user authentificatio n.
Yeah, i know, i mean authorization. :)
And roles is the rights applied to the users.
Roles are groups of rights applied to the users.

Cya
Dec 13 '07 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
1853
by: Carl J. Hixon | last post by:
I am setting up a web site and have questions about security. I would like to use a forum script like phpBB, I would also like to use a CMS package like Mambo, and a file sharing system. Since I will be storing confidential content and the forums are for authorized users only...I'd like all of these packages to use the same user authentication. Furthermore, I'd like to allow users to be able to create an account but not access the files...
0
4248
by: Anonieko Ramos | last post by:
ASP.NET Forms Authentication Best Practices Dr. Dobb's Journal February 2004 Protecting user information is critical By Douglas Reilly Douglas is the author of Designing Microsoft ASP.NET Applications and owner of Access Microsystems. Doug can be reached at doug@accessmicrosystems.com. --------------------------------------------------------------------------------
4
1957
by: Paul M | last post by:
hi there, i've got a website i created, that i've put onto my test server on the web. I have a login page, that when the user comes to it, it first pops up a windows authentication dialog box, and i dont know why? i click cancel on it and the page still works as normal. How can i remove this, and why is it appearing? i am also not using any .NET authentication methods or anything..
6
517
by: Manny Chohan | last post by:
I am using forms authetication in the web config. i can validate a user against a database and click on images which makes hidden panels visible.However when i click on the link inside a panel which should take user to another pages, it defaults them back to the login page prompting them to enter username and password. Could someone please shed some light on this on how i can fix this issue? Thanks Manny
1
3717
by: jeremy.stitt | last post by:
Does anyone know if it is possible to set IIS authentication methods (e.g. anonymous access, basic authentication, IWA, etc) in the web.config file? For example, I want to remove Anonymous Access for an entire directory in my ASP .NET project and only use Integrated Windows Authentication. Is there some way I can configure that in the web.config file or do I need my Infrastructure guys to make that change in IIS?
0
2423
by: Wee Bubba | last post by:
our web application employs Forms Authentication because anonymous users log in over the internet. the application also contains a bunch of web service methods that are purely used by an internal tech support application. although the application as a whole uses Forms Authentication, i would like to restrict access to these web service methods to just the internal Tech Support Team/application on the local network. is this possible? ...
1
9534
by: Tony Stephens | last post by:
Hi, I've created a small forms based application in c# to test a vendor's product and the web service interface that it exposes. We have deployed two instances of the vendor product one which has an unprotected (no authentication) interface and one that is protected using HTTP basic authentication. I can invoke methods on the unprotected instance and everything's fine. When I attempt to invoke methods on the protected instance the...
0
1364
by: rshekhtm | last post by:
Hi everyone, I would like to get your opinion on a technique I came up with when faced with the problem of redundant code in every web method (authentication, logging, exception handling). Normally, my web methods would look something like this: public ReturnType GetSomeData(SomeType param1) {
0
1526
by: Albertas | last post by:
What I'm doing wrong that I can't make my authentication to work. Here is the situation: I'm hosting a Web Service from a Windows forms application, using .NET Framework 3.0 WCF. And I want to implement user authentication. Here is my Web Service class called "methods": public class Authentication : SoapHeader { public String user; public String pwd;
2
7520
by: Frank Swarbrick | last post by:
I am trying to understand "client authentication" works. My environment is DB2/UDB LUW 8.2 on zSeries SLES9 as the database server and DB2 for VSE 7.4 as the client. We currently have DB2/LUW set up as follows: Client Userid-Password Plugin (CLNT_PW_PLUGIN) = Client Kerberos Plugin (CLNT_KRB_PLUGIN) = Group Plugin (GROUP_PLUGIN) = GSS Plugin for Local Authorization ...
0
9622
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10109
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
9916
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8939
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7464
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5360
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5486
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
3611
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2853
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.