Wednesday, November 18, 2009

Chapter 11. Authentication and Security











 < Day Day Up > 











Chapter 11. Authentication and Security









Many

web database applications require restrictions to control user

access. Some applications deal with sensitive information such as

bank account details, while others only provide information or

services to paying customers. These applications need to authenticate

and authorize user requests, typically by collecting a username and

password that are checked against a list of valid users. As well as

authenticating those who have access to a service, web applications

often need to protect the data that is transmitted over the Internet

from those who shouldn't see it.





In this chapter, we show you the techniques used to build web

database applications that authenticate and authorize users and

protect the data that is transmitted over the Web. The topics covered

in this chapter include:





  • How HTTP authentication works and how it can be used with Apache and

    PHP

  • Writing PHP scripts to manage user authentication and authorization

  • Authorizing access from an IP address or a range of IP addresses

  • Writing PHP scripts that authenticate users against a table in a

    database

  • The practical aspects of building session-based web database

    applications to authenticate users, including techniques that

    don't use HTTP authentication

  • A case study example that develops an authentication framework,

    demonstrating many of the techniques presented in this chapter

  • The features of the encryption services provided by the Secure

    Sockets Layer

















     < Day Day Up > 



    1 comment:

    Betty said...

    Both the techniques are used in many areas to secure information. In this article everyone will find how these techniques are used to develop that protects the data being transmitted online by authenticating the users.
    digital signature software