Hi,
I am developing a system on which multiple front-end kiosks machines
will be connected to a central server. I am being asked for the
authentication mechanism for the machines, like how will the central
server authenticate the machines on the network. IP authentication or
password authentication is too simple for them. I thinking more on
the lines of some sort of digital certificates. But I have seen them
run
on servers, never on clients.
My server is based on asp pages running on IIS. The client program is
in vb / vb.net. I want to know how can asp pages authentic vb/vb.net
clients by means of certificates or for that matter, anything else.
The client wants the authentication control to himself, so that not
even me can tamper with the system.
I hope you guys understand the question and direct in me in the right
way and I also do hope that this is the right group for such a
question. Many thanks in advance.
Regards
Jawad 1 1193
Hi there,
I understand what it is you are trying to achieve. I am not sure of
the exact method to implement digital certificate handling in ASP,
however there is a more fundamental issue that you need to deal with
first :- What is the PKI model that you are going to follow to reach
your desired goal. For example it is possible to purchase digital
certificates from various vendors, and it is also possible to create
your own servers for this task. I would suggest that it would be a
good idea to speak with a properly qualified security person in your
area to get the security model right, which will then in turn tell you
what you will need to do to achieve your goals, then you can find out
what technical shortcomings you need to overcome. I cant stress enough
how important it is to get the security model right and correctly
implemented. If it is done properly then you will have a safe and
secure system, if not it doesnt really matter how advanced the
certificates or the cryptography used is - you will have a false sense
of security and the system remains a soft target for attack.
If you want some good background info on dealing with certificates and
implementing them then I would suggest any of the study guides /
reading material for the CompTIA Security+ certification wuld be a
good start. You will get a good grounding in the ideas of implementing
certificates from these readings, and also the other related topics /
tasks that have to be taken into consideration.
Good luck with this, and feel free to post back if you need more
advice. If I can assist I will.
Cheers
The Frog This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Frank |
last post by:
Hi,
we are using oracle clients (Release 9.0.1.0.1 - Production)
on an NT4 (Service Pack6) computers. the server is a W2K,
(Oracle9i Enterprise Edition Release 9.0.1.1.1 - Production
With the Partitioning option,JServer Release 9.0.1.1.1 - Production) machine.
now we are going to update several of those client boxes
to a dual processor board. - great thinking but they are
randomly crashing to blues screen. okay it is ms
but the old...
|
by: Marc Champagne |
last post by:
Hi folks!
I have built a VB project in VS.NET 7 which also includes a
deployment project.
Everything builds ok.
When I install the setup package, it installs without a
glitch.
|
by: robert |
last post by:
well, talk about timely. i'm tasked to implement a security feature,
and would rather do so in the database than the application code. the
application is generally Oracle, but sometimes DB2. Oracle has what
it calls package DBMS_RLS, which implements application ignorant
row level security.
scanning this group yielded "you can't do that; use views". then i
dug out DB2Mag qtr 1 2004, and there is MLS for v8/390. from this
article,...
|
by: Mike MacSween |
last post by:
S**t for brains strikes again!
Why did I do that? When I met the clients and at some point they vaguely
asked whether eventually would it be possible to have some people who could
read the data and some who couldn't but that it wasn't important right now.
And I said, 'sure, we can do that later'.
So now I've developed an app without any thought to security and am trying
to apply it afterwards. Doh!, doh! and triple doh!
|
by: Ashish |
last post by:
Hi Guys
I am getting the following error while implementing authentication using
WS-security.
"Microsoft.Web.Services2.Security.SecurityFault: The security token could
not be authenticated or authorized ---> System.Exception: WSE565: The
password provided the SecurityTokenManager does not match the one on the
incoming token. at
Microsoft.Web.Services2.Security.Tokens.UsernameTokenManager.VerifyPlainText
| |
by: prithvi g via .NET 247 |
last post by:
Hi
I am a newbie to .NET remoting, I am trying to implementauthorization using SSPI example provided by Michael Barnett. Ihave included the required dll(Microsoft.Samples.Security.SSPI.dll andMicrosoft.Samples.Runtime.Remoting. Security in both my clientand server. I have have defined my config files as follows
for client
<?xml version="1.0" encoding="utf-8" ?>
<configuration>
<system.runtime.remoting>
<application>
<channels>...
|
by: Earl Teigrob |
last post by:
Background:
When I create a ASP.NET control (User or custom), it often requires security to be set for certain functionality with the control. For example, a news release user control that is comprised of a DataGrid may have separate permissions for adding, deleting and updating a news item.
Problem
Up until now, I have been implementing security directly inside the control. I will test directly against the security model to see if...
|
by: Magdelin |
last post by:
Hi,
My security team thinks allowing communication between the two IIS instances
leads to severe security risks. Basically, we want to put our presentation
tier on the perimeter network and the business tier inside the fire wall or
internal network. The biz tier will be developed and deployed as web services
on IIS.
I know microsoft recommends this architecture but I am not able to convince
my security team. They say IIS is vulnerable...
|
by: Jay C. |
last post by:
Jay
3 Jan. 11:38 Optionen anzeigen
Newsgroups: microsoft.public.dotnet.framework.webservices.enhancements
Von: "Jay" <p.brunm...@nusurf.at> - Nachrichten dieses Autors suchen
Datum: 3 Jan 2006 02:38:30 -0800
Lokal: Di 3 Jan. 2006 11:38
Betreff: Referenced security token could not be retrieved
Antworten | Antwort an Autor | Weiterleiten | Drucken | Einzelne Nachricht |
Original anzeigen | Entfernen | Missbrauch melden
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
| |
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
| |
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |