asp.net 3.5

How to restrict access to Anonymous Users with Forms Authentication in ASP.NET

From practical point of view, you do not need to restrict access to pages in order to use authentication. In this article will be demonstrated the redirection functionality of forms authentication. This functionality forces ASP.NET to redirect anonymous users to the login page. You can use the simple technique of denying access to all unauthenticated users. …

Learn more

How to configure Forms Authentication in ASP.NET

You can configure forms authentication in your web.config file. Every web.config file includes the <authentication /> configuration section and you have to configure this section with the values Forms:

<authentication mode=”Forms”>

<!– Detailed configuration options –>

</authentication>

The <authentication /> configuration is limited to the top-level web.config file of your application. If the mode attribute …

Learn more

Forms authentication classes in ASP.NET

The FormsAuthenticationModule is the most important part of the forms authentication framework. The module is an HttpModule class that detects existing forms authentication tickets in the request. If the ticket is not available and the user requests a protected resource, it automatically redirects the request to the login page configured in your web.config file before this …

Learn more

How does Forms authentication work in ASP.NET

Forms authentication is a ticket-based or token-based system. When users log in, they receive a ticket with basic user information. This information is stored in an encrypted cookie that’s attached to the response so it’s automatically submitted on each subsequent request.

When a user requests an ASP.NET page that is not available for anonymous users, …

Learn more

How does SSL work with asymmetric encryption

Every certificate includes a public key which a part of asymmetric key pair. The public key is freely provided to anyone who is interested. The corresponding private key is kept locked and is available only to the server. Anything that’s encrypted with one of the keys is decipherable with the other. In other words client can …

Learn more

How do certificates work

When a client has to exchange sensitive data with a website, he/she must easily decide whether to trust the site. Certificates were designed to serve this need, by making it possibly to partially verify a user’s identity. Certificates can be installed on any type of computer, but they in most cases are found on web servers.

Learn more

How does Secure Sockets Layer (SSL) technology work

The SSL technology encrypts communication over HTTP. SSL is supported by a wide range of browsers and ensures that a spy (“bad guy”) can’t simply decipher information exchanged between a client and a web server. SSL is important for hiding sensitive information such as:

– Credit card numbers

– Confidential …

Learn more