473,289 Members | 1,875 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,289 software developers and data experts.

Authorizing Network and External Users

I'm trying to develop a single security model that has to work for
authenticated users and for users coming in from the outside world.

I have looked at the Web Site Administration tool for dealing with
external users and creating roles.

The problem with this tool is that
a) it appears only to be available in a development environment and
can't be used in production by the application administrator
b) There is no way to map Authorized i.e. an entire NT security group
against the same roles.

I should be able to write code like this

If User.IsInRole("SysAdmin") OrElse User.IsInRole("Moderator") Then
' User is OK
Else
' Redirect to unauthorized access page
End If

iIn my application and not worry if the role belongs to a user who is
part of an NT Security group or someone who has logged in through the
internet with a password.

I'd like to store all the information and relationships in a single
datastore. And give the application administrator the ability to
manage it similar to the Web Site Adminstrator interfacet.

Has anyone tried anything similar? Have you run into any issues ?

Erick

Aug 28 '07 #1
1 1122
On Aug 27, 10:28 pm, Erick <josefszel...@hotmail.comwrote:
I'm trying to develop a single security model that has to work for
authenticated users and for users coming in from the outside world.

I have looked at the Web Site Administration tool for dealing with
external users and creating roles.

The problem with this tool is that
a) it appears only to be available in a development environment and
can't be used in production by the application administrator
b) There is no way to map Authorized i.e. an entire NT security group
against the same roles.

I should be able to write code like this

If User.IsInRole("SysAdmin") OrElse User.IsInRole("Moderator") Then
' User is OK
Else
' Redirect to unauthorized access page
End If

iIn my application and not worry if the role belongs to a user who is
part of an NT Security group or someone who has logged in through the
internet with a password.

I'd like to store all the information and relationships in a single
datastore. And give the application administrator the ability to
manage it similar to the Web Site Adminstrator interfacet.

Has anyone tried anything similar? Have you run into any issues ?

Erick
You might want to search the ASP.Net newsgroup for this. I have heard
tale of using mixed security providers - but I heard it is quite
complicated to implement.

Thanks,

Seth Rowe

Aug 28 '07 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: cvopicka | last post by:
i have found many refrences to access being slow over a netowrk but my boss and i just found this and i was hoping to get some help. on the local machine we have the Access 2000 format database...
3
by: Demetri | last post by:
How do I find out what the network IP address is? For example if I have a cable modem with 68.57.200.50 as the IP address and the linksys router assigns PC's on the network 192.168.1.1 how do I...
2
by: Kevin Hoskins | last post by:
Is there anyway to force authentication of the Anonymous user? Here is the situation: I have an ASP.NET page which calls an assembly which requires a certain level of permissions. The page is...
0
by: Pete | last post by:
I am using windows authentication in Apache to access the web page - work Ok but I need to use this authentication, username and password to access an external network to get some data. How do I...
2
by: f rom | last post by:
----- Forwarded Message ---- From: Josiah Carlson <jcarlson@uci.edu> To: f rom <etaoinbe@yahoo.com>; wxpython-users@lists.wxwidgets.org Sent: Monday, December 4, 2006 10:03:28 PM Subject: Re: ...
3
by: dion.naidoo | last post by:
Hi ,is there any way one can restrict users to copy files with extensions that we dont want on our networks or local pcs. Users are local administrators of their pcs. PS. If this is not possible...
1
by: Erick | last post by:
I'm trying to develop a single security model that has to work for authenticated users and for users coming in from the outside world. I have looked at the Web Site Administration tool for...
2
by: eliezerchoo | last post by:
Hello, I was successfully created a C# network internal loopback test in same machine (1 PC). My program consisted of client and server. It's can do the internal loopback with IP 127.0.0.1 when run...
10
by: gary0gilbert | last post by:
An unusual spin to this recurring disk or network error in a Terminal Server environment. Access 2000, Terminal Server 2000, file server is windows 2000. All users have a separate copy of the...
2
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 7 Feb 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:30 (7.30PM). In this month's session, the creator of the excellent VBE...
0
by: MeoLessi9 | last post by:
I have VirtualBox installed on Windows 11 and now I would like to install Kali on a virtual machine. However, on the official website, I see two options: "Installer images" and "Virtual machines"....
0
by: DolphinDB | last post by:
The formulas of 101 quantitative trading alphas used by WorldQuant were presented in the paper 101 Formulaic Alphas. However, some formulas are complex, leading to challenges in calculation. Take...
0
by: Aftab Ahmad | last post by:
Hello Experts! I have written a code in MS Access for a cmd called "WhatsApp Message" to open WhatsApp using that very code but the problem is that it gives a popup message everytime I clicked on...
0
by: ryjfgjl | last post by:
ExcelToDatabase: batch import excel into database automatically...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
1
by: PapaRatzi | last post by:
Hello, I am teaching myself MS Access forms design and Visual Basic. I've created a table to capture a list of Top 30 singles and forms to capture new entries. The final step is a form (unbound)...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.