Download presentation
Presentation is loading. Please wait.
1
Security & .NET 12/1/2018
2
Contents Introduction Security : overview Architectures Conclusion
.NET Framework Architectures Conclusion 12/1/2018 Varaprasad Reddy
3
Introduction Advent of Networking Sharing through Internet
Distributed environment Challenges of Dist. Environment Security Key goal of .NET: Securely Manage who ,and what, accesses their data 12/1/2018
4
Security : overview .NET Framework
Foundation for .NET dev. Technologies Basis for easy building , deploying & executing : XML based web services web applications client applications 12/1/2018
5
Security ( Contd.. ) .NET Framework CLR
Execution engine for .NET Framework based apps Functions Code Management Memory Management for apps & objs Security rules enforcement Access control for code Interoperation between code & pre-existing COM objs 12/1/2018
6
Security ( contd.. ) .NET Framework Class Libraries
Provides functionality for : User interface design Threading Security Management NT communications etc. 12/1/2018
7
Security ( contd.. ) .NET Framework Security features Role-based
Evidence-based Code-based Cryptography 12/1/2018
8
Security ( contd.. ) Role-based Security
Applications use role-based security to enforce business rule constraints Individuals are grouped into roles with varying levels of access .NET role-based security works by making user and role information available to the current thread Unified model for Authentication & Authorization 12/1/2018
9
Security ( Contd.. ) Role-based Security (Contd..) Authentication :
Examining user credentials Authorization : Analyzing user roles – what rights and operations allowed to perform .NET Framework provides support for common authentication protocols KERBEROS SSL/TLS etc. 12/1/2018
10
Security ( Contd.. ) Role-based Security (Contd..)
.NET Framework also enables Developers to incorporate .NET passport authentication & cookie based authentication Great deal of flexibility with authorization Ex. devs can use XML to designate to what level of access users have etc. 12/1/2018
11
Security ( Contd.. ) Evidence-based
granting access based on evidence shown ex: Code signed with a certain key or having certain hash value gives more granular support for admins to control dangerous , partially trusted code 12/1/2018
12
Security ( Contd.. ) Code – Access Similar to evidence based
Ex. code residing in a directory Similar access as in evidence-based Four different possibilities: Trusted user , un-trusted code Un-trusted user , trusted code Trusted user , Trusted code Un-trusted user , Un-trusted code 12/1/2018
13
Security ( Contd.. ) Code-Access (Contd..)
Hence has to authorize both users and code No runtime security decisions by users Code is verified by memory type safe only access objects it has reference to only use defined interfaces to objects also , well informed metadata and instructions 12/1/2018
14
Permissions can always be defined to limit access to system resources
Code-Access ( Contd.. ) C# , VB verifiable C++ not verifiable Permissions can always be defined to limit access to system resources Stack walk Demand must be satisfied by all callers 12/1/2018
15
Security ( Contd.. ) Cryptography
.NET Framework includes functions for Encryption Hashing Digital signatures Random No. generation 12/1/2018
16
Architectures Global XML Web Services Architecture (GXA)
XML web services are the building blocks in the move to distributed computing on internet. These web services provide greater level of interoperability through numerous protocols XML SOAP UDDI GXA is Microsoft’s Web service architecture with added reliability and security 12/1/2018
17
Architectures (Contd..)
GXA ( Contd.. ) Key design principles : Modularity Built on modular components which can be used to create solutions giving exact set of features General purpose Designed for variety of XML web service scenarios including B2B , B2C , P2P apps Federated Standards based Built on standard XML web services and protocols 12/1/2018
18
Architectures (Contd..)
GXA ( Contd.. ) Security in GXA Using WS-Security specification defines Std. set of SOAP extensions for implementing integrity and confidentiality in Web services applications Provides standard mechanisms to exchange secure, signed messages in a Web services environment Provides an important foundation layer that will help developers build more secure and broadly interoperable Web services. 12/1/2018
19
Architectures (Contd..)
.NET Passport Centralized model of FIM Subsequent sites gets user authentication info by CCD (Component configuration Document) CCD is an XML doc. 12/1/2018
20
Conclusion XML playing crucial role in distributed env
.NET provides means for the info to travel seamlessly and securely between applications , web sites and devices. .NET provides all round security in to the new world of distributed computing and WS. 12/1/2018
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.