Advertisement

Securing .NET Remoting

Summary

In this chapter, I showed you how to leverage IIS’s built-in authentication and encryption feature. You now know how to set up the IIS virtual root to allow certain authentication protocols and how to check a user’s role membership in your components. I also showed you how to encrypt the HTTP traffic using SSL certificates.

You’ve also learned how you can use an additional component from Microsoft to secure and authenticate remoting traffic independently from the chosen transport format.

Last but not least you have had a close look at the new .NET Remoting security infrastructure included with the next version of the .NET Framework, which allows you to authenticate and/or impersonate the client’s identity as well as securing traffic between the client and the server through digital signatures and encryption.

In the next chapter, you’ll learn about some specialties of .NET Remoting. The chapter covers more advanced lifetime management issues, versioning, asynchronous calls, and events.

Keywords

Authentication Protocol Security Infrastructure Client User Authentication Mode Security Sample 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Ingo Rammer and Mario Szpuszta 2005

Personalised recommendations