70 104 197 0 24 143 0 32 80 0 216 204 0 178 148 0 130 114 186 216 10 127 186 0 138 0 255 185 0 255 140 0 220 60 0 244 114 208 236 0 140 180 0 158 109 194.

Slides:



Advertisements
Similar presentations
FI-WARE Testbed Access Control temporary solution.
Advertisements

Research and Innovation Participant Portal How to register for an ECAS account NEXT.
Managing Student Access. What will we cover Registration Options Student Uploads Login Options Alumni Access versus Student Access.
Forms Authentication, Users, Roles, Membership Ventsislav Popov Crossroad Ltd.
Module 5: Configuring Access to Internal Resources.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
An Authorization Service using.NET Passport ™ as underlying Authentication Scheme Bar-Hen Ron Hochberger Daniel Winter 2002 Technion – Israel Institute.
Microsoft Passport Waldemar Swiercz.
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
Copyright © 2007, SAS Institute Inc. All rights reserved. SAS Activity-Based Management Survey Kit (ASK): User Management & Security.
Teacher Training Your Name. Digital Age What’s inside? 95% of workbook content The complete Test Master CD-ROM content Additional webquests Complete.
Teacher Training Martha Ramírez. Digital Age What’s inside? 95% of workbook content Complete workbook audio Automatic marking Student gradebook Student.
© 2013 Cisco System Inc. All rights reserved Cisco Confidential 1 © 2013 Cisco System Inc. All rights reserved. 1 Allow System Distribution Lists to be.
Session 11: Security with ASP.NET
Forms Authentication, Users, Roles, Membership Svetlin Nakov Telerik Corporation
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Module 8 Configuring and Securing SharePoint Services and Service Applications.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Oracle Application Express Security. © 2009 Oracle Corporation Authentication Out-of-the-Box Pre-Configured Schemes LDAP Directory credentials Oracle.
Project Server 2003: DC340: Security (Part 1 of 2): How to securely deploy Project Server in an enterprise environment Pradeep GanapathyRaj (PM), Karthik.
Information Management System “ Expert Profile Module" Information Management System “ Expert Profile Module" The Expert Profile module is an integrated.
Dr. Mustafa Cem Kasapbaşı Security in ASP.NET. Determining Security Requirements Restricted File Types.
AHS Physician Portal: PACS Sign On A STEP-BY-STEP GUIDE FOR USERS Created By: Andreina Perez-Cardarelli.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Simplify TeleHealth - Copyright 2012 Emerge.MD inc - Confidential Single Sign On via Active Directory Federation Services 4.6 Release (March 2014) Updates.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Quick Start Guide to Zscaler. Purpose Greater understanding of Zscaler including; How to backup and restore configurations. How to change rules to comply.
Module 11: Securing a Microsoft ASP.NET Web Application.
Slide 1 ASP Authentication There are basically three authentication modes Windows Passport Forms There are others through WCF You choose an authentication.
Information Management System “Good Practice Module" Information Management System “Good Practice Module" The Good Practice / Success Stories module is.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
PHP Secure Communications Web Technologies Computing Science Thompson Rivers University.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Copyright © 2006, Infinite Campus, Inc. All rights reserved. User Security Administration.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
1 Delta Confidential 1 Extranet FTP Portal DET - IT Department March 30, 2006.
Security A major concern related to the design of web applications Many sites contain a huge quantity of personal and financial information. Web sites.
From “Control Panel”, launch “Programs and Features” then select “Turn Windows features on or off” Lab 2: Setup Lab Environment.
Securing Angular Apps Brian Noyes
Security E-Learning Chapter 08. Security Control access to your web site –3 Techinques for Identifying users Giving users access to your site Securing.
V CSWFN51_MASTER Accessing the New Web Site.
 How we should structure our checkout and order process?  Checkout and Order Process of our framework  Stages of Checkout and Order Process.
The Shaw Group Inc. WebVPN - Access Anywhere Users Manual.
Employer Login Setup & Password Reset. The following information is available by either going to FFGA Marketing Sharepoint site at
An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack Source: ACSAC 2011 Authors: Dongwan Shin, Rodrigo Lopes Report: Minhao Wu.
Information Management System “Project Module" Information Management System “Project Module" The Project module is an integrated part of System. The back.
Introduction to Microsoft Windows 2000 Security Microsoft Windows 2000 Security Services Overview Security subsystem components Local security authority.
Delegated Admin Tool Delete User Training Module.
1 /6 Introducing TaxWise Online’s Administrator Functions © 2006, Universal Tax Systems, Inc. All Rights Reserved. Administrator Functions Objectives –In.
1. Begin Quick Start 2. Administration 3. Good to Know 4. Slightly Technical 5. User Experience 6. You are ready to go !
U.S. Department of Agriculture eGovernment Program eAuthentication Initiative eAuthentication Solution Screens Review Meeting October 7, 2003.
Office of Information Technology GT Identity and Access Management JA-SIG CAS project (introducing login.gatech.edu) April 29th,

Investigation authentication using AAF for the CVL on NeCTAR
Registration Tutorial
Status of new ALICE web pages
Section 12.1 Section 12.2 Discuss the functions of a Web site
Jim Fawcett CSE686 – Internet Programming Summer 2005
VCE Dumps
Active Orders Supplier Administrator Training Getting Started Activities This training presentation describes the Getting Started activities that will.
Multifactor Authentication & First Time Login
Django in the real world
Single Sign On Glen Dorton 1/18/2019.
Office 365 Development.
Django Users and Registration
Designing IIS Security (IIS – Internet Information Service)
FCL – Administration Tool
Security - Forms Authentication
Presentation transcript:

Microsoft Virtual Academy Django in the real world

Security

Security concepts

Secure Sockets Layer (SSL)

Securing the data on the wire

How it works

How it works

Performance concerns

Enabling SSL

Authentication vs Authorization

What's the difference?

Modes of authentication You authenticate by providing some form of an accepted credential Just like in real life, the form can change

In real life

On the web

Django and authentication

Authentication in Django

Authentication is automatically enabled In fact, we already used it when we created the admin site We just need to provide the appropriate views

Creating a login page

The view code

Create a login page

Accessing the current user

Access the current user by using user

Logging out Just like there's a login method... There's a logout method def logout(request): auth.logout(request); return redirect("/");

Adding logout and administration links

User registration

To create a user, we need

The code

Creating a registration page

Requiring authentication

If you just need to ensure the user is logged in You could use user.is_authenticated... But a better way to do it is to use the login_required def submit_session(request): return render(request, 'app/submit_session.html');

What does login_required do?

Ensuring the user is logged on