• Complain

Nigel Chapman - Authentication and Authorization on the Web

Here you can read online Nigel Chapman - Authentication and Authorization on the Web full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2012, publisher: MacAvon Media, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Nigel Chapman Authentication and Authorization on the Web
  • Book:
    Authentication and Authorization on the Web
  • Author:
  • Publisher:
    MacAvon Media
  • Genre:
  • Year:
    2012
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Authentication and Authorization on the Web: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Authentication and Authorization on the Web" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A short book in the Web Security Topics series for Web developers, by the well-known authors Nigel and Jenny Chapman. Web applications manipulate resources in response to requests from users. It is often necessary to determine whether a requested operation should be allowed for the user who sent the request. This process of authorization - that is, deciding whether an application should be allowed to carry.out the operation which a request from a particular user or program calls for - depends on, but is separate from, the process of authentication. Authentication means determining the identity of the user or program sending the request. This is usually done by maintaining user accounts, protected by passwords, and by requiring users to log in. Written for professional and student Web developers, this book provides a clear and practical description of authentication and authorization for Web sites. Secure methods of storing users account details are described, with special emphasis on the secure storage of passwords. The authors explain different methods of authentication, and techniques for applying authorization to requests from authenticated users. A simple application, written in JavaScript and built on the Express framework, is developed throughout the book to demonstrate the principles. The source code is provided via the companion site websecuritytopics.info. Topics covered include hashing and salting passwords for secure storage, using CAPTCHAs to prevent the creation of bogus accounts, resetting passwords, session-based authentication and attacks against sessions, HTTP authentication, OpenId, authorization based on user accounts, role-based authorization, and OAuth. Notes on relevant topics in cryptography are also included. Clear key points provide useful summaries at the end of each section, and technical terms are defined in a 16-page glossary.

Nigel Chapman: author's other books


Who wrote Authentication and Authorization on the Web? Find out the surname, the name of the author of the book and a list of all author's works by series.

Authentication and Authorization on the Web — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Authentication and Authorization on the Web" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Authentication and
Authorization on the Web

Nigel Chapman and Jenny Chapman

Web Security Topics Series Authentication and Authorization on the Web - photo 1

Web Security Topics Series

Authentication and Authorization on the Web

Published by MacAvon Media
Achnaha House, Kilchoan, Acharacle PH36 4LW Scotland (UK)

www.macavonmedia.com

ISBN: 978-0-9567370-5-2

Copyright 2012 by Nigel Chapman and Jenny Chapman

All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, without the prior permission in writing of MacAvon Media, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, Saffron House, 6-10 Kirby Street, London EC1N 8TS UK.

Requests to the publisher should be emailed to requests@macavonmedia.com.

Nigel Chapman and Jenny Chapman have asserted their right under the Copyright, Designs and Patents Act 1988 to be identified as the authors of this work.

Published in the United Kingdom by MacAvon Media, Scotland.

The publisher and authors make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice contained in this book may not be suitable for every situation.

This work is intended to provide accurate information in regard to the subject matter covered. It is sold on the understanding that the Publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Neither the publisher nor the authors shall be liable for damages arising therefrom.

The fact that an organization or Web site is referred to in this work as a citation and/or as a potential source of further information or products does not mean that the authors or the publisher endorse the information which the organization or Web site may provide or any recommendations which it may make or products which it may sell.

All brand names and product names referred to in this book are the trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher and authors are not associated with any product or vendor mentioned in this book.

Contents
About This Book

The short books in the Web Security Topics series have been designed to provide Web developers with the essential practical information they need to protect their applications against attack in the increasingly hostile world of the modern Internet. Each book focuses on a specific area of interest.

Security has become an issue that no Web developer can afford to ignore. Scarcely a week goes past without news of a break-in occurring at some high-profile Web site. Sometimes the result is just a temporary loss of service, but all too often passwords, personal information and credit card details are stolen. Only the attacks on well-known sites reach the news, but there are countless other unreported attacks on smaller sites which, although not newsworthy, are nevertheless of great importance to the small businesses that own them, to their customers, and to the developers responsible for building and maintaining those sites.

Most books on Web security are aimed not at working developers but at security specialists and professional security consultants. Those books are dedicated to examining the intricacies of particular forms of attack, to the extent that it sometimes seems as though they are manuals for potential attackers. We have therefore written this series of short books to focus specifically on the areas of interest to Web developers. We describe and explain only what developers need to know in order to defend their own applications against attack, leaving more time free for the creation of exciting and useful Web applications.

In this book we are concerned with ensuring that the resources managed by an application are protected so that they can only be manipulated by the users and programs entitled to do so. Conventionally, this is achieved by setting up user accounts protected by passwords and requiring users to log in, so we begin by describing how user accounts can be maintained and how passwords can be kept safe and secure. We go on to consider authentication, which is the process of verifying the identity of a user sending a request. This is usually done by requiring the user to provide their correct password when they log in, and by using cookies to remember their identity and associate it with subsequent requests, although we also consider some alternative arrangements.

It is a relatively simple matter to identify the owner of each resource and assign roles to users. A system of authorization can then be implemented to ensure that each request from a user will only be honoured by the application if their role gives them the necessary privileges to perform the requested operation on the resource identified in the requests URL.

We have developed a simple Web application, using the Express framework, as an example which runs throughout the book. Code extracts from this application are used to illustrate each principle as it is introduced. The application is written in JavaScript, a language which should be familiar to all Web developers. Some of the more advanced JavaScript programming techniques in our examples, and the use of Express and Node.js to create a JavaScript application that runs outside a browser, may perhaps be less familiar. A free short tutorial on these subjects is provided on the series companion Web site at www.websecuritytopics.info. The code for the examples is also available for free download visit the companion site for details of how to obtain it.

In order to humanize what can be a dry subject, we have adapted the characters of Abelardo and his beloved Lady Gwendolen, who we found in our collection of obscure older films. Together with their associates, the pair feature in all the books in the Web Security Topics series. It seemed appropriate to place these characters in Freedonia, a country that also belongs in the movie archives, and has the advantage of a country TLD, .fd, which is not actually assigned in reality. Where it matters, we have tested examples using .fd domain names on a specially configured local server. Abelardo and friends are expert tiddlywinks players. We may have made up the characters, but the tiddlywinks jargon they sometimes employ is authentic.

This book includes a full glossary of the (non-tiddlywinks) technical terms which are used in the text. The first significant occurrence of each term defined in the glossary is printed in bold italics .

The companion Web site for all the books in the Web Security Topics series provides further information, useful links and supporting material. Visit the site at www.websecuritytopics.info.

The fact that some examples in this book refer to the code sharing service Github should not be taken as an endorsement of Githubs services by the authors or publisher, nor as an endorsement of this text by Github.

Important Disclaimer

The example code in this book is provided solely for the purposes of illustrating some principles and techniques of authentication and authorization. It is not intended for serious use in sensitive applications. Neither the publisher nor the authors shall be liable for any consequence arising from the use of program code in this book for any purpose other than illustration of general principles in the context of learning.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Authentication and Authorization on the Web»

Look at similar books to Authentication and Authorization on the Web. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Authentication and Authorization on the Web»

Discussion, reviews of the book Authentication and Authorization on the Web and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.