Oldest pages

From Guidance Share

Jump to: navigation, search

Showing below up to 50 results starting with #1.
View (previous 50) (next 50) (20 | 50 | 100 | 250 | 500).

  1. ASP.NET 1.1 Performance Checklist ‎(12:38, 13 October 2006)
  2. ASP.NET 2.0 Code Examples ‎(09:11, 15 October 2006)
  3. What's new in ASP.NET 2.0 in terms of Authentication? ‎(10:23, 16 October 2006)
  4. How do I decide my Authentication strategy in ASP.NET? ‎(10:24, 16 October 2006)
  5. How do I use Forms Authentication with SQL Server database? ‎(10:24, 16 October 2006)
  6. How do I use Forms Authentication with Active Directory? ‎(10:24, 16 October 2006)
  7. How do I enable Forms Authentication to work with multiple Active Directory domains? ‎(10:25, 16 October 2006)
  8. How do I protect Forms Authentication? ‎(10:25, 16 October 2006)
  9. How do I enforce strong passwords using membership feature in ASP.NET 2.0 ‎(10:31, 16 October 2006)
  10. How do I protect passwords in user store? ‎(10:32, 16 October 2006)
  11. What are the issues with Forms Authentication in Web Farm Scenario? ‎(10:32, 16 October 2006)
  12. How do I implement single sign on using forms authentication? ‎(10:32, 16 October 2006)
  13. How do I use my custom user / identity store with forms authentication? ‎(10:33, 16 October 2006)
  14. How do I configure account lockout using membership feature in ASP.Net 2.0? ‎(10:33, 16 October 2006)
  15. When and how do I use windows authentication in ASP.NET 2.0? ‎(10:33, 16 October 2006)
  16. When and how do I use Kerberos authentication in ASP.NET 2.0? ‎(10:34, 16 October 2006)
  17. What's new in ASP.NET 2.0 in terms of Authorization? ‎(10:43, 16 October 2006)
  18. What is the difference between URL authorization, File authorization and Role authorization?? ‎(10:44, 16 October 2006)
  19. How do I use URL Authorization in ASP.NET 2.0? ‎(10:44, 16 October 2006)
  20. How do I use File Authorization in ASP.NET 2.0? ‎(10:44, 16 October 2006)
  21. How do I use Role Authorization in ASP.NET 2.0? ‎(10:44, 16 October 2006)
  22. How is the AuthorizationStoreRoleProvider different from Authorization Manager APIs? ‎(10:45, 16 October 2006)
  23. How do I use Windows Groups for role authorization in ASP.NET 2.0? ‎(10:45, 16 October 2006)
  24. How do I use my custom role store for roles authorization? ‎(10:45, 16 October 2006)
  25. How do I cache roles in ASP.NET 2.0? ‎(10:46, 16 October 2006)
  26. How do I protect authorization cookie when using role caching in ASP.NET 2.0? ‎(10:46, 16 October 2006)
  27. How do I lock authorization settings? ‎(10:46, 16 October 2006)
  28. How do I use RoleManager in my application? ‎(10:47, 16 October 2006)
  29. ASP.NET 2.0 Security FAQs ‎(10:50, 16 October 2006)
  30. How do I use the Health monitoring feature in ASP.NET 2.0? ‎(11:14, 16 October 2006)
  31. What's new in ASP.NET 2.0 in terms of Auditing and Logging? ‎(11:15, 16 October 2006)
  32. What security events does health monitoring log by default? ‎(11:15, 16 October 2006)
  33. How do I instrument my application for security? ‎(11:15, 16 October 2006)
  34. When writing to a new event source from my ASP.NET application running under the Network service security context, I get registry permission exception. Why is this and how do I correct this ‎(11:16, 16 October 2006)
  35. How do I protect audit and log files? ‎(11:16, 16 October 2006)
  36. What's new in ASP.NET 2.0 in terms of Code Access Security? ‎(11:17, 16 October 2006)
  37. How do I use code access security with ASP.NET? ‎(11:17, 16 October 2006)
  38. How do I create a custom trust level for ASP.NET? ‎(11:17, 16 October 2006)
  39. What are the permissions at the various trust levels? ‎(11:18, 16 October 2006)
  40. How do I write partial trust applications? ‎(11:18, 16 October 2006)
  41. When should I put assemblies in GAC, what are security implications? ‎(11:18, 16 October 2006)
  42. When do I use impersonation in ASP.NET 2.0? ‎(11:29, 16 October 2006)
  43. How do I impersonate the original caller? ‎(11:29, 16 October 2006)
  44. How do I temporarily impersonate the original caller? ‎(11:30, 16 October 2006)
  45. How do I impersonate a specific (fixed) identity? ‎(11:30, 16 October 2006)
  46. When should I use programmatic impersonation? ‎(11:31, 16 October 2006)
  47. How do I use programmatic impersonation? ‎(11:31, 16 October 2006)
  48. What is protocol transition and when do I care? ‎(11:31, 16 October 2006)
  49. What is Constrained Delegation? ‎(11:31, 16 October 2006)
  50. How can I retain impersonation in the new thread created from ASP.NET application? ‎(11:32, 16 October 2006)

View (previous 50) (next 50) (20 | 50 | 100 | 250 | 500).

Views
Personal tools