Search - Articles
DevASP.NET for ASP.NET, VB.NET, XML and C# (C-Sharp) Developers Tuesday, March 03, 2009
Dev Articles
Search Directory
SQL Server

Home >Search > Articles & Samples > C-Sharp > Authentication

What's New - What's Hot
Service Identity and Authentication  Version: 0.00     Price: $0.00  
Total Hits: 33  |  Today: 0Author: Microsoft Corporation      Rating:  
Read Reviews | Write Review |  Your Rating: 

A service's endpoint identity is a value generated from the service Web Services Description Language (WSDL). This value, propagated to any client, is used to authenticate the service. After the client initiates a communication to an endpoint and the service authenticates itself to the client, the client compares the endpoint identity value with the actual value the endpoint authentication process returned. If they match, the client is assured it has contacted the expected service endpoint. This...

CustomUserNameSecurityTokenAuthenticator Class  Version: 0.00     Price: $0.00  
Total Hits: 44  |  Today: 0Author: Microsoft Corporation      Rating:  
Read Reviews | Write Review |  Your Rating: 

Override the CustomUserNameSecurityTokenAuthenticator class when the Windows authentication provided by the WindowsUserNameSecurityTokenAuthenticator class isn't sufficient. The WindowsUserNameSecurityTokenAuthenticator class authenticates the user name and password in a UserNameSecurityToken security token as a Windows account....

Implementing CLR Stored Procedure in Linq based n-tier architecture  Version: 0.00     Price: $0.00  
Total Hits: 80  |  Today: 0Author: Virat Kothari      Rating:  
Read Reviews | Write Review |  Your Rating: 

This article is a sequence of my previous article about “CLR Stored Procedure & creating it step by step”. In my previous article I have explained CLR Stored Procedure, benefits & drawbacks of it and also how to implement it. CLR Stored Procedure is very powerful and gives better results while executing complex logic, intense string operation or string manipulations, cryptography, accessing system resources and file management, etc. Development of any project in n-tier architecture is different ...

Authenticated Encryption     
Total Hits: 156  |  Today: 0Author: Jeffrey Walton      Rating:  
Read Reviews | Write Review |  Your Rating: 

The concept of verifying the integrity of encrypted data appeared in the 1970s in the banking industry. The problem was studied in detail by the ANSI X9 committee, and later formalized by Katz and Yung [13]. Banks did not want to transmit data and allow an attacker to flip a bit undetected. In this situation, the attacker would not decrypt the message, instead he would only flip a bit so that the encrypted message "Post $100" would be changed to "Post $700"....

.NET Role-Based Security in a Production Environment     
Total Hits: 98  |  Today: 0Author: Ralph in Boise      Rating:  
Read Reviews | Write Review |  Your Rating: 

This article shows how to make role-based security work for a .NET 2.0 application on a shared hosting server using a remote SQL Server 2005 database. Many have asked the question, “My ASP application uses role-based security, and it works well on my ‘localhost’ with SQL Server 2005 Express. How can I make it work on a production server in a shared hosting environment?”...

Getting the authenticated username     
Total Hits: 283  |  Today: 0Author: admin under      Rating:  
Read Reviews | Write Review |  Your Rating: 

Ok, after reading those articles we know how to limit access to a specific location on our website, but what about a more finegrained control. I mean, maybe some people should get to see some extra items in the menu or something, while other shouldn't.
Assuming you have a database with some kind of usertype column (superadmin/admin/readonly for example) the problem now is - all we know now is that all people accessing our protected area are indeed validated against our database - but we can't...

Is Your App Running As Administrator?  Version: 0.00     Price: $0.00  
Total Hits: 15  |  Today: 0Author: John Simmons / outlaw programmer      Rating:  
Read Reviews | Write Review |  Your Rating: 

Once again, I was working on a future CodeProject article, and decided that I wanted to force one of the applications in the solution to be run in admin mode so that the processing in that application could be performed without interferance from the UAC. Because the whole application needs to run in admin mode, and because there may be times when I might want to run several subsequent forms from the Main method, I put this code into the Main method so that the form(s) won't even run if the app i...

Consuming Google (Reader) with .NET: Part 1 - Authentication  Version: 0.00     Price: $0.00  
Total Hits: 40  |  Today: 0Author: Sandrino Di Mattia      Rating:  
Read Reviews | Write Review |  Your Rating: 

Since a few weeks I've become more and more a fan of Google Reader. This great online RSS reader supports starring items, extended search, ... anything you expect from a good RSS reader. What I would like to do in the following articles is connect to and consume Google services.

Before starting I do need to point out that there is a .NET ready API written by Google, called the Google Data Protocol. This library supports many of the Google services and is very well documented....

AuthenticatingEventArgs Class  Version: 0.00     Price: $0.00  
Total Hits: 39  |  Today: 0Author: Microsoft Corporation      Rating:  
Read Reviews | Write Review |  Your Rating: 

You create a handler for the Authenticating event when you want to customize how the user's credentials are authenticated at run time. The AuthenticatingEventArgs class supplies values to any Authenticating event handler. By using the properties available in this class, you can retrieve the user credentials to customize authentication....

Get The User Name In C# For NT Authentication  Version: 0.00     Price: $0.00  
Total Hits: 57  |  Today: 0Author: Nick Parker      Rating:  
Read Reviews | Write Review |  Your Rating: 

Our department has recently begun moving all of our Client/Server Applications over to Windows NT authentication via Active Directory. Our previous applications used a SQL Server login for each user. This can become very tedious when it come to setting up users across the company for wide spread applications. There are also inherent security risks involved without the user being authenticated. I thought I would share the following code dealing with security in .NET in hopes that it will help som...

Authenticating with a proxy in WPF     
Total Hits: 207  |  Today: 0Author: Paul Coldrey      Rating:  
Read Reviews | Write Review |  Your Rating: 

The basic story is that I had some code that went off to a timestamp server using HttpWebRequest and worked fine in .NET 2.0. Then I had to use it with .NET 3.0 and got the error:

(407) Proxy Authentication Required.

Now, I already had all the code to add a proxy to the request and the very same code worked in .NET 2.0 so it was a but of a mystery. At the time of writing WPF is still pretty new and so there is not a lot of documentation. Hence a week of wasted time began and once I...

HOW TO: Create Keys with Visual C# .NET for Use in Forms Authentication (Q312906)      
Total Hits: 991  |  Today: 0Author: MSDN      Rating:  
Read Reviews | Write Review |  Your Rating: 

This article describes how to create keys to use for encryption, decryption, and validation of Forms authentication cookie data. You can use the keys that you create in this article for the validationKey and decryptionKey attributes of the section in the element in the Machine.config and Web.config files....

User Authentication     
Total Hits: 1256  |  Today: 0      Rating:  
Read Reviews | Write Review |  Your Rating: 

Here, you'll learn the use of a VB.NET class library project through this User Authentication example. Instead of the conventional ADO recordset, I've used the new Dataset(check out my previous article for more information on Datasets) to traverse. Once the class is ready and compiled, you can reference this class in any VB.NET project by selecting the Project -> Add Reference menu option....

Securing directories with Forms Authentication      
Total Hits: 930  |  Today: 0      Rating:  
Read Reviews | Write Review |  Your Rating: 

This tutorial is a step by step examination of what you need to do to secure a directory in your application with Forms Authentication....

How to Create FormAuthentication  Version: 0.00     Price: $0.00  
Total Hits: 26  |  Today: 0Author: Jayendrasinh Gohil      Rating:  
Read Reviews | Write Review |  Your Rating: 

In this article you will learn how to Create FormAuthentication in Windows Forms....

AuthorizationContext Class  Version: 0.00     Price: $0.00  
Total Hits: 33  |  Today: 0Author: Microsoft Corporation      Rating:  
Read Reviews | Write Review |  Your Rating: 

The result of evaluating all authorization policies available from the tokens in the sent message and by calling the GetAuthorizationPolicies method....

Forms Authentication ! An Introduction  Version: 0.00     Price: $0.00  
Total Hits: 66  |  Today: 0Author: Kamal Singh Kharayat      Rating:  
Read Reviews | Write Review |  Your Rating: 

This article is intended to the beginners of Authentication and Authorization in ASP.NET. Here I tried to show how to use Forms Authentication and the related authorization, using which I can deny unauthorized access to my Secure Pages....

Simple Excel Automation using C#  Version: 0.00     Price: $0.00  
Total Hits: 55  |  Today: 0Author: Gigy      Rating:  
Read Reviews | Write Review |  Your Rating: 

Create a new project, for simplicity, create a Windows application, go ahead and right click on References in the Solution Explorer, and select Add Reference? When the Add Reference window comes up, select the COM tab. This will list all Component names which are available on your machine. Since we are going to use MS Excel, you will scroll down until you find: Microsoft Excel 11.0 Object Library. You can even do the same thing PIAs. In the code I have used PIA....

SMTP Mailer with Authentication     
Total Hits: 126  |  Today: 0Author: pjutard      Rating:  
Read Reviews | Write Review |  Your Rating: 

This article describes a simple assembly to send mails programmatically using a SMTP server that requires authentication. It also works with those servers that doesn't require it.

In this release, you cannot use attachments, but I will implement it as soon as possible....

Subverting Vista UAC in Both 32 and 64 bit Architectures     
Total Hits: 114  |  Today: 0Author: Pero Matić      Rating:  
Read Reviews | Write Review |  Your Rating: 

The purpose of this article is to illustrate how to correctly launch an interactive process from a service in Windows Vista, and also to demonstrate how to launch that process with full Administrator privileges. An interactive process is one that is capable of displaying a UI on the desktop. The article shows how to create a service called LoaderService that serves as an application loader and whose purpose is to launch, at boot time, a command prompt that runs as an Administrator. The article c...

Disclaimer - Privacy
© 2002-2017