Authentication and Authorization on the Web

Authentication and Authorization on the Web
Author :
Publisher :
Total Pages : 246
Release :
ISBN-10 : 0956737056
ISBN-13 : 9780956737052
Rating : 4/5 (052 Downloads)

Book Synopsis Authentication and Authorization on the Web by : Nigel Chapman

Download or read book Authentication and Authorization on the Web written by Nigel Chapman and published by . This book was released on 2012-10 with total page 246 pages. Available in PDF, EPUB and Kindle. Book excerpt: A short book in the "Web Security Topics" series for Web developers, by the well-known authors Nigel and Jenny Chapman. Web applications manipulate resources in response to requests from users. It is often necessary to determine whether a requested operation should be allowed for the user who sent the request. This process of authorization - that is, deciding whether an application should be allowed to carry.out the operation which a request from a particular user or program calls for - depends on, but is separate from, the process of authentication. Authentication means determining the identity of the user or program sending the request. This is usually done by maintaining user accounts, protected by passwords, and by requiring users to log in. Written for professional and student Web developers, this book provides a clear and practical description of authentication and authorization for Web sites. Secure methods of storing users' account details are described, with special emphasis on the secure storage of passwords. The authors explain different methods of authentication, and techniques for applying authorization to requests from authenticated users. A simple application, written in JavaScript and built on the Express framework, is developed throughout the book to demonstrate the principles. The source code is provided via the companion site websecuritytopics.info. Topics covered include hashing and salting passwords for secure storage, using CAPTCHAs to prevent the creation of bogus accounts, resetting passwords, session-based authentication and attacks against sessions, HTTP authentication, OpenId, authorization based on user accounts, role-based authorization, and OAuth. Notes on relevant topics in cryptography are also included. Clear key points provide useful summaries at the end of each section, and technical terms are defined in a 16-page glossary.


Authentication and Authorization on the Web Related Books

Authentication and Authorization on the Web
Language: en
Pages: 246
Authors: Nigel Chapman
Categories: Computers
Type: BOOK - Published: 2012-10 - Publisher:

DOWNLOAD EBOOK

A short book in the "Web Security Topics" series for Web developers, by the well-known authors Nigel and Jenny Chapman. Web applications manipulate resources in
Authentication
Language: en
Pages: 576
Authors: Richard E. Smith
Categories: Computers
Type: BOOK - Published: 2002 - Publisher: Addison-Wesley Professional

DOWNLOAD EBOOK

Authentication is the way computers can confidently associate an identity with a person. This book examines the problem that networking professionals face in ch
Mechanics of User Identification and Authentication
Language: en
Pages: 760
Authors: Dobromir Todorov
Categories: Business & Economics
Type: BOOK - Published: 2007-06-18 - Publisher: CRC Press

DOWNLOAD EBOOK

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at
Cellular Authentication for Mobile and Internet Services
Language: en
Pages: 212
Authors: Silke Holtmanns
Categories: Technology & Engineering
Type: BOOK - Published: 2008-09-15 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

An invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and integration into existing networks Cellular Auth
Advances in User Authentication
Language: en
Pages: 360
Authors: Dipankar Dasgupta
Categories: Computers
Type: BOOK - Published: 2017-08-22 - Publisher: Springer

DOWNLOAD EBOOK

This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of a