In this chapter, I showed you how to leverage IIS’s built-in authentication and encryption feature. You now know how to set up the IIS virtual root to allow certain authentication protocols and how to check a user’s role membership in your components. I also showed you how to encrypt the HTTP traffic using SSL certificates.
You’ve also learned how you can use an additional component from Microsoft to secure and authenticate remoting traffic independently from the chosen transport format.
Last but not least you have had a close look at the new .NET Remoting security infrastructure included with the next version of the .NET Framework, which allows you to authenticate and/or impersonate the client’s identity as well as securing traffic between the client and the server through digital signatures and encryption.
In the next chapter, you’ll learn about some specialties of .NET Remoting. The chapter covers more advanced lifetime management issues, versioning, asynchronous calls, and events.
KeywordsAuthentication Protocol Security Infrastructure Client User Authentication Mode Security Sample
Unable to display preview. Download preview PDF.