About Web Forms in .NET Framework

Written by Balaji


About Web Forms in .NET Framework

Web pages in ASP.Net are called ASP.NET Web Forms which have certain server controls such as text, dropdown list, checkboxes, and buttons. An ASP.NET Web Form looks similar torepparttar web forms in HTML. The only difference is that in ASP.NET,repparttar 133476 Web Forms runs atrepparttar 133477 server side and in HTMLrepparttar 133478 web forms runs atrepparttar 133479 client side. Apart from this difference an ASP.NET Web Form has more features than an ordinary HTML web form such as:

• The code blocks are processed onrepparttar 133480 server

• The entire page in ASP.NET is compiled when it is requested forrepparttar 133481 first time. When you make subsequent requests,repparttar 133482 page is not compiled but shown directly in your browser

• ASP.NET Web Forms can contain page directives. Page directives allow you to setrepparttar 133483 default language and user controls tags forrepparttar 133484 entire page. You can also turn off session state and ViewState management using page directives

• An ASP.NET Web Form can contain both user controls and Server side Includes (SSIs)

Access Control List in .NET Framework

Written by Balaji


Access Control List in .NET Framework

Once you complete developing a web application, you need to secure it. This is whenrepparttar aspect of security comes into picture. There will be some portions of your application which need to be secured from users. Securing an application may need extra hardware to build complex multi-layer systems with firewalls, and also some highly secure features. Security enables you to provide access to a specified user afterrepparttar 133475 user is authenticated and authorized to accessrepparttar 133476 resources in your web application. The Access Control List is used inrepparttar 133477 authorization process.

The basic concepts of security are Authentication, Authorization, Impersonation and Data or functional security. Authentication isrepparttar 133478 process that enables to identify a user, so that only that user is provided access torepparttar 133479 resources. Authorization isrepparttar 133480 process that enables to determine whether a particular user can be given access torepparttar 133481 resources thatrepparttar 133482 user requests. Impersonation isrepparttar 133483 process that provides access to resources requested by a user under a different identity. Data or functional security isrepparttar 133484 process of securing a system physically, updatingrepparttar 133485 operating system and using robust software.

Some elements of an operating system,repparttar 133486 Internet Information Server (IIS), andrepparttar 133487 .NET Framework work in coordination to providerepparttar 133488 features required to executerepparttar 133489 security concepts mentioned above. For example, Windows 2000 uses its own list of user accounts for identifying and authenticating users. IIS identifiesrepparttar 133490 users based onrepparttar 133491 information provided by Windows, whenrepparttar 133492 users access a web site. IIS after identification ofrepparttar 133493 users, passes this information to ASP.NET. Thenrepparttar 133494 user information is checked for authorization.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use