background preloader

Security

Facebook Twitter

Locking the bad guys out with asymmetric encryption. Encryption, the transformation of data into a form that prevents anyone unauthorized from understanding that data, is a fundamental technology that enables online commerce, secure communication, and the protection of confidential information. Encryption algorithms are the mathematical formulae for performing these transformations. You provide an encryption algorithm with a key and the data you want to protect (the plaintext), and it produces an encrypted output (the ciphertext). To read the output, you need to feed the key and the ciphertext into a decryption algorithm (sometimes these are identical to encryption algorithms; other times they are closely related but different). Encryption algorithms are designed so that performing the decryption process is unfeasibly hard without knowing the key. The algorithms can be categorized in many different ways, but perhaps the most fundamental is the distinction between symmetric and asymmetric encryption. c = me (mod n) Decryption is similar:

Two new attacks on SSL decrypt authentication cookies. Researchers have devised two new attacks on the Transport Layer Security and Secure Sockets Layer protocols, the widely used encryption schemes used to secure e-commerce transactions and other sensitive traffic on the Internet. The pair of exploits—one presented at the just-convened 20th International Workshop on Fast Software Encryption and the other scheduled to be unveiled on Thursday at the Black Hat security conference in Amsterdam—don't pose an immediate threat to the millions of people who rely on the Web-encryption standards. Still, they're part of a growing constellation of attacks with names including BEAST, CRIME, and Lucky 13 that allow determined hackers to silently decrypt protected browser cookies used to log in to websites.

Together, they underscore the fragility of the aging standards as they face an arsenal of increasingly sophisticated exploits. It’s about TIME TIME works in a similar fashion. Not enough Band-Aids. Authentication and Authorization. Authentication is any process by which you verify that someone is who they claim they are. Authorization is any process by which someone is allowed to be where they want to go, or to have information that they want to have. For general access control, see the Access Control How-To. Introduction If you have information on your web site that is sensitive or intended for only a small group of people, the techniques in this article will help you make sure that the people that see those pages are the people that you wanted to see them. This article covers the "standard" way of protecting parts of your web site that most of you are going to use.

Note: If your data really needs to be secure, consider using mod_ssl in addition to any authentication. The Prerequisites The directives discussed in this article will need to go either in your main server configuration file (typically in a <Directory> section), or in per-directory configuration files (.htaccess files). AllowOverride AuthConfig Realm Require ip. Authentication & Authorization. Registration for Web-Based Applications - Google Accounts Authentication and Authorization. Authorization Roles in CRM Web Channel (SAP Library - SAP CRM: Business Scenario and Business Process Configuration) Use You assign authorization roles to your users in CRM Web Channel to determine which applications they can enter and the tasks they can carry out in these applications. There are two types of authorization roles provided by SAP: ● For service users There is a service user role for each Web-based application to provide an anonymous stateless RFC connection between the Web-based application and the backend SAP CRM system. ● For Internet users There are various user roles provided by SAP for stateful connections to the different Web-based applications.

SAP delivers standard authorization roles which you can change and modify to meet your needs. Features The table below lists the various Web-based applications along with the user and service user roles that are delivers in the standard SAP shipment. Example You want to create a user for your B2B Web shop. User Authentication in ASP.NET Web API. ASP.NET authentication and authorization. Updated with New video ASP.NET authentication and authorization Introduction This article will discuss how to implement ASP.NET authentication and authorization. This article initially starts with authentication and authorization concepts and later explains the three important ways of doing authentication and authorization i.e. windows, forms and passport.

As the article moves ahead it explains basic, digest and integrated authentication in depth. This article also dives in depth on how forms authentication can be used to implement custom authentication and single-sign on authentication. One of the important concepts this article touch bases is ticket generation in cookies and how ASP.NET membership and role can help us to increase productivity. This is a small Ebook for all my .NET friends which covers topics like WCF,WPF,WWF,Ajax,Core .NET,SQL etc you can download the same from here or else you can catch me on my daily free training @ from here Authentication and Authorization 1.

Bastion » A blog about J2EE Security, WebLogic, authentication, authorization, auditing, and PKI. According to the Java Servlet Specification, there are four standard methods of authentication in web applications: FORM, BASIC, DIGEST, and CLIENT-CERT. FORM is quite common, but BASIC and DIGEST are not. CLIENT-CERT is primarily used for client certificate authentication but it has more to offer than you might imagine from the name. First, let’s have a look at a web.xml snippet to see where the authentication methods go. <login-config><auth-method>FORM</auth-method><realm-name>MyRealm</realm-name><! -- The following stanza is for the FORM method only --><form-login-config><form-login-page>/login.jsp</form-login-page><form-error-page>/login.jsp?

As you can see, it’s the auth-method element that can be FORM, BASIC, DIGEST, or CLIENT-CERT. Regardless of the authentication method, the server will only attempt to authenticate the user when he tries to access a protected resource. Let’s turn our attention now to each authentication method in turn. But wait, there’s more… Configuring CLIENT-CERT. What are the different ways for performing authorization in a web application other than role-based authorization. Add Honey Pot Instructions. How to Avoid Spambots. (Page 5/6) Passing You Over Your website is your property and, as a result, you are allowed to restrict by contract who is allowed to visit it. For example, it may be possible to limit access by "non-human visitors," including spambots that harvest your email addresses. If you already have terms of use that apply to your website, consider adding language such as that suggested in our Model Terms of Use.

In the alternative, you may link to these terms stored here: You should consider including a no-email-collection metatag at the top of each of the pages of your site. In addition to installing a no-email-collection metatag and modifying the terms of use that apply to your website, you should consider participating in Project Honey Pot and including honey pot addresses on your site. Finally, the following box appears at the bottom of the pages through which we display honey pot addresses. Choosing an Auth Mechanism - Google Accounts Authentication and Authorization.

Basic access authentication. In the context of a HTTP transaction, basic access authentication is a method for an HTTP user agent to provide a user name and password when making a request. Features[edit] Security[edit] The BA mechanism provides no confidentiality protection for the transmitted credentials. They are merely encoded with Base64 in transit, but not encrypted or hashed in any way.

Because the BA header has to be sent with each HTTP request, the web browser needs to cache credentials for a reasonable period of time to avoid constantly prompting the user for their username and password. HTTP does not provide a method for a web server to instruct the client to "log out" the user. Unfortunately, this behavior is inconsistent between various browsers and browser versions.[2] Microsoft Internet Explorer offers a dedicated JavaScript method to clear cached credentials:[3] <script>document.execCommand('ClearAuthenticationCache', 'false');</script> Protocol[edit] Server side[edit] Client side[edit] See also[edit]

OAuth. For MediaWiki's (the software used by Wikipedia) OAuth support, see mw:Help:OAuth OAuth is an open standard for authorization, commonly used as a way for Internet users to log into third party websites using their Microsoft, Google, Facebook or Twitter accounts without exposing their password.[1] Generally, OAuth provides to clients a 'secure delegated access' to server resources on behalf of a resource owner.

It specifies a process for resource owners to authorize third-party access to their server resources without sharing their credentials. Designed specifically to work with Hypertext Transfer Protocol (HTTP), OAuth essentially allows access tokens to be issued to third-party clients by an authorization server, with the approval of the resource owner. The third party then uses the access token to access the protected resources hosted by the resource server.[2] OAuth is a service that is complementary to and distinct from OpenID. History[edit] OAuth 2.0[edit] Security[edit] Uses[edit] OAuth Community Site.

Using OAuth 2.0 to Access Google APIs - Google Accounts Authentication and Authorization. Basic steps All applications follow a basic pattern when accessing a Google API using OAuth 2.0. At a high level, you follow four steps: 1. Obtain OAuth 2.0 credentials from the Google Developers Console. Visit the Google Developers Console to obtain OAuth 2.0 credentials such as a client ID and client secret that are known to both Google and your application. 2.

Before your application can access private data using a Google API, it must obtain an access token that grants access to that API. There are several ways to make this request, and they vary based on the type of application you are building. Some requests require an authentication step where the user logs in with their Google account. User consent If the user grants the permission, the Google Authorization Server sends your application an access token (or an authorization code that your application can use to obtain an access token). 3. 4. Access tokens have limited lifetimes. Scenarios Web server applications Installed applications. Document Authorizations (SAP Library - SAP CRM: Business Scenario and Business Process Configuration)