473,404 Members | 2,174 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,404 software developers and data experts.

clients editing information w/o authentication--advice needed

I have a client that provides a list of companies on their web site (powered
by PHP/MySQL.) These companies advertise their services to visitors. The
company information has been maintained exclusively by the client, but now
they would like to provide a way for the companies to update their own
information.

Can someone suggest a reasonable secure method to allow the companies to
edit their own information without a login and authentication procedure? One
idea is to provide each customer an URL which includes an encrypted token.
The token could be generated using a unique piece of data like an email
address or telephone number. It could be decrypted serverside and validated.
I've done something similar for other clients on a tight budget and it
worked well, but am wondering if there's a better approach without adding
full-fledge authentication.

All comments/suggestions are appreciated.
Jul 17 '05 #1
4 1809
>I have a client that provides a list of companies on their web site (powered
by PHP/MySQL.) These companies advertise their services to visitors. The
company information has been maintained exclusively by the client, but now
they would like to provide a way for the companies to update their own
information.

Can someone suggest a reasonable secure method to allow the companies to
edit their own information without a login and authentication procedure? One
idea is to provide each customer an URL which includes an encrypted token.
I hope that's a http*S* URL.

What's the real difference between something like:

https://www.mysite.com/cgi-bin/editm...corp&pw=hackme

vs., say, a .htaccess setup (on a secure site) where the client has
to provide the user name 'bigcorp' and the password 'hackme'?
The only important difference I see is that the URL probably gets
cached in the client's browser, and that might be a weakness.

The token could be generated using a unique piece of data like an email
address or telephone number. It could be decrypted serverside and validated.
The token itself *IS* the password. What it contains after you
decrypt it is irrelevant. You don't have to decrypt it to get in.
It might be a big problem if someone can figure out your token-generating
scheme and guess *ALL* of them. It's more secure to generate the
token from something more random, like coin flips.
I've done something similar for other clients on a tight budget and it
worked well, but am wondering if there's a better approach without adding
full-fledge authentication.
Unless your clients like to see their info changed to something obscene,
I suggest they spring for triple-fledge authentication.
All comments/suggestions are appreciated.


Gordon L. Burditt
Jul 17 '05 #2
In article <%CEgd.332796$3l3.106562@attbi_s03>,
"Bosconian" <bo*******@planetx.com> wrote:
I have a client that provides a list of companies on their web site (powered
by PHP/MySQL.) These companies advertise their services to visitors. The
company information has been maintained exclusively by the client, but now
they would like to provide a way for the companies to update their own
information.

Can someone suggest a reasonable secure method to allow the companies to
edit their own information without a login and authentication procedure? One
idea is to provide each customer an URL which includes an encrypted token.
The token could be generated using a unique piece of data like an email
address or telephone number. It could be decrypted serverside and validated.
I've done something similar for other clients on a tight budget and it
worked well, but am wondering if there's a better approach without adding
full-fledge authentication.

All comments/suggestions are appreciated.


Allowing only a specific IP address to access and change a page is about
the closest you'll get to any sort of unique access. It's not very
secure and I think any sort of proxy server in between the client and
the server won't correctly send the IP address. This is the nature of
stateless client/server systems.

I'd push back with this client and point out the benefits of some sort
of authentication with usernames and passwords. Add a SSL certificate
and it will be even more secure. You're essentially being asked to
build a car without any sort of internal combustion engine.

--
DeeDee, don't press that button! DeeDee! NO! Dee...

Jul 17 '05 #3
Thanks for your replies.

I completely concur that username/password authentication is the way to go.
SSL, while the most secure, is not essential since there's no confidential
or financial information being stored or shared.

I will "push back" with the client and tell them they'd be better off
continuing to edit the information themselves without implementing proper
authentication (albeit sans SSL.)

<Michael Vilain <vi****@spamcop.net>> wrote in message
news:vi**************************@news.giganews.co m...
In article <%CEgd.332796$3l3.106562@attbi_s03>,
"Bosconian" <bo*******@planetx.com> wrote:
I have a client that provides a list of companies on their web site (powered by PHP/MySQL.) These companies advertise their services to visitors. The
company information has been maintained exclusively by the client, but now they would like to provide a way for the companies to update their own
information.

Can someone suggest a reasonable secure method to allow the companies to
edit their own information without a login and authentication procedure? One idea is to provide each customer an URL which includes an encrypted token. The token could be generated using a unique piece of data like an email
address or telephone number. It could be decrypted serverside and validated. I've done something similar for other clients on a tight budget and it
worked well, but am wondering if there's a better approach without adding full-fledge authentication.

All comments/suggestions are appreciated.


Allowing only a specific IP address to access and change a page is about
the closest you'll get to any sort of unique access. It's not very
secure and I think any sort of proxy server in between the client and
the server won't correctly send the IP address. This is the nature of
stateless client/server systems.

I'd push back with this client and point out the benefits of some sort
of authentication with usernames and passwords. Add a SSL certificate
and it will be even more secure. You're essentially being asked to
build a car without any sort of internal combustion engine.

--
DeeDee, don't press that button! DeeDee! NO! Dee...

Jul 17 '05 #4
>I completely concur that username/password authentication is the way to go.
SSL, while the most secure, is not essential since there's no confidential
or financial information being stored or shared.


But the PASSWORD is confidential information (I hope) ...

It does matter what the password is protecting, but in this
case it seems to be protecting the ability to CHANGE information
rather than the ability to see it.

Gordon L. Burditt
Jul 17 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Sean McKaharay | last post by:
I am using the code below and I am getting this error: "Insufficient state to deserialize the object. More information is needed." Has anyone seen this? It is working with other dll's but not on a...
67
by: Steven T. Hatton | last post by:
Some people have suggested the desire for code completion and refined edit-time error detection are an indication of incompetence on the part of the programmer who wants such features. ...
0
by: Andrew L. Gould | last post by:
This email is semi-off topic; but documents a problem and the server-side solution when using MS Access as a client to many (all?) database servers. I decided to post the problem/solution because...
4
by: Oliver Stratmann | last post by:
Hello All, does anyone know, where the configuration of a db2-client on a windows-machine is stored? I searched the registry and the filesystem on my machine and couldn't find anything. Is...
6
by: Greg Stoch | last post by:
Hi Everyone, Is there any tool for this in VC++, to produce linker info (LIB) for the arbitrary DLL? How the VC++ environment does this when DLL is created itself in VC++, which subprogram is...
0
by: Dabbler | last post by:
I have created a sitemap for my clients and would like them to be able to add and remove nodes as needed from an administration page. Can anyone direct me to some sample code that allows...
5
by: dreamonzzz | last post by:
i need help . im using ADODC for my database settings, VB6. can anyone tell me how to edit the database ? need help asap.. thnx allot
1
by: jayo17 | last post by:
Hi i want to make a form that edits information on the table. the way i want it to be is on the first form have cascading combo boxes (which i have done already) and when the selection is made...
3
by: Ian Hobson | last post by:
Hi guys, I am trying to build a simple menu. See http://jupiter.ianhobson.co.uk/msc/index.htm It looks how I want in FF and Safari, but IE6 is not playing nice. It is adding space between...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.