Using Active Directory to authenticate users in a WWW facing website

Posted by Basiclife on Stack Overflow See other posts from Stack Overflow or by Basiclife
Published on 2010-03-13T13:10:30Z Indexed on 2010/03/13 13:15 UTC
Read the original article Hit count: 375

Hi,

I'm looking at starting a new web app which needs to be secure (if for no other reason than that we'll need PCI accreditation at some point).

From previous experience working with PCI (on a domain), the preferred method is to use integrated windows authentication which is then passed all the way through the app to the database. This allows for better auditing as well as object-level permissions (ie an end user can't read the credit card table).

There are advantages in that even if someone compromises the webserver, they won't be able to glean any additional information from the database. Also, the webserver isn't storing any database credentials (beyond perhaps a simple anonymous user with very few permissions)

So, now I'm looking at the new web app which will be on the public internet. One suggestion is to have a Active Directory server and create windows accounts on the AD for each user of the site. These users will then be placed into the appropriate NT groups to decide which DB permissions they should have (and which pages they can access).

ASP already provides the AD membership provider and role provider so this should be fairly simple to implement.

There are a number of questions around this - Scalability, reliability, etc... and I was wondering if there is anyone out there with experience of this approach or, even better, some good reasons why to do it / not to do it.

Any input appreciated

Regards

Basiclife

© Stack Overflow or respective owner

Related posts about activedirectorymembership

Related posts about domaincontroller