Forms Authentication, Authorization, User Accounts, and Roles:: Security Basics and
Forms Authentication, Authorization, User Accounts, and Roles:: Security Basics and
Introduction
What is the one thing forums, eCommerce sites, online email websites, portal
websites, and social network sites all have in common? They all offer user accounts.
Sites that offer user accounts must provide a number of services. At a minimum,
new visitors need to be able to create an account and returning visitors must be able
to log in. Such web applications can make decisions based on the logged in user:
some pages or actions might be restricted to only logged in users, or to a certain
subset of users; other pages might show information specific to the logged in user,
or might show more or less information, depending on what user is viewing the
page.
This is the first tutorial in a series of tutorials that will explore techniques for
authenticating visitors through a web form, authorizing access to particular pages
and functionality, and managing user accounts in an ASP.NET application. Over the
course of these tutorials we will examine how to:
These tutorials are geared to be concise and provide step-by-step instructions with
plenty of screen shots to walk you through the process visually. Each tutorial is
available in C# and Visual Basic versions and includes a download of the complete
code used. (This first tutorial focuses on security concepts from a high-level
viewpoint and therefore does not contain any associated code.)
In this tutorial we will discuss important security concepts and what facilities are
available in ASP.NET to assist in implementing forms authentication, authorization,
user accounts, and roles. Let’s get started!
Note: Security is an important aspect of any application that spans physical,
technological, and policy decisions and requires a high degree of planning and
domain knowledge. This tutorial series is not intended as a guide for
developing secure web applications. Rather, it focuses specifically on forms
authentication, authorization, user accounts, and roles. While some security
concepts revolving around these issues are discussed in this series, others are
left unexplored.
Secure authentication systems involve at least one of the following three facets:
something you know, something you have, or something you are. Most web
applications rely on something the client knows, such as a password or a PIN. The
information used to identify a user – her username and password, for example – are
referred to as credentials. This tutorial series focuses on forms authentication, which
is an authentication model where users log in to the site by providing their
credentials in a web page form. We have all experienced this type of authentication
before. Go to any eCommerce site. When you are ready to check out you are asked
to log in by entering your username and password into textboxes on a web page.
A user account is a store for persisting information about a particular user. User
accounts must minimally include information that uniquely identifies the user, such
as the user’s login name and password. Along with this essential information, user
accounts may include things like: the user’s email address; the date and time the
account was created; the date and time they last logged in; first and last name;
phone number; and mailing address. When using forms authentication, user account
information is typically stored in a relational database like Microsoft SQL Server.
Web applications that support user accounts may optionally group users into roles. A
role is simply a label that is applied to a user and provides an abstraction for defining
authorization rules and page-level functionality. For example, a website might
include an “Administrator” role with authorization rules that prohibit anyone but an
Administrator to access a particular set of web pages. Moreover, a variety of pages
that are accessible to all users (including non-Administrators) might display
additional data or offer extra functionality when visited by users in the
Administrators role. Using roles, we can define these authorization rules on a role-
by-role basis rather than user-by-user.
By default, browsers send HTTP requests that lack any sort of identification
information. But if the browser does include authentication information then the web
server starts the authentication workflow, which attempts to identify the client
making the request. The steps of the authentication workflow depend on the type of
authentication being used by the web application. ASP.NET supports three types of
authentication: Windows, Passport, and forms. This tutorial series focuses on forms
authentication, but let’s take a minute to compare and contrast Windows
authentication user stores and workflow.
Basic authentication
Digest authentication
Windows Integrated Authentication
All three techniques work in roughly the same way: when an unauthorized,
anonymous request arrives, the web server sends back an HTTP response that
indicates that authorization is required to continue. The browser then displays a
modal dialog box that prompts the user for their username and password (see Figure
1). This information is then sent back to the web server via an HTTP header.
Figure 1: A Modal Dialog Box Prompts the User for His Credentials
The supplied credentials are validated against the web server’s Windows User Store.
This means that each authenticated user in your web application must have a
Windows account in your organization. This is commonplace in intranet scenarios. In
fact, when using Windows Integrated Authentication in an intranet setting, the
browser automatically provides the web server with the credentials used to log on to
the network, thereby suppressing the dialog box shown in Figure 1. While Windows
authentication is great for intranet applications, it is usually unfeasible for Internet
applications since you do not want to create Windows accounts for each and every
user who signs up at your site.
After verifying the submitted credentials, a forms authentication ticket is created for
the user. This ticket indicates that the user has been authenticated and includes
identifying information, such as the username. The forms authentication ticket is
(typically) stored as a cookie on the client computer. Therefore, subsequent visits to
the website include the forms authentication ticket in the HTTP request, thereby
enabling the web application to identify the user once they have logged in.
Once the user has successfully logged in, subsequent HTTP requests include the
forms authentication ticket. The forms authentication system merely identifies the
user - it is the authorization system that determines whether the user can access the
requested resource.
File authorization and URL authorization define authorization rules for accessing a
particular ASP.NET page or for all ASP.NET pages in a particular directory. Using
these techniques we can instruct ASP.NET to deny requests to a particular page for a
particular user, or allow access to a set of users and deny access to everyone else.
What about scenarios where all of the users can access the page, but the page’s
functionality depends on the user? For example, many sites that support user
accounts have pages that display different content or data for authenticated users
versus anonymous users. An anonymous user might see a link to log in to the site,
whereas an authenticated user would instead see a message like, “Welcome back,
Username” along with a link to log out. Another example: when viewing an item at
an auction site you see different information depending on whether you are a bidder
or the one auctioning the item.
Prior to ASP.NET 2.0, developers were responsible for creating their own user and
role stores. They were also on the hook for designing the user interfaces and writing
the code for essential user account-related pages like the login page and the page to
create a new account, among others. Without any built-in user account framework in
ASP.NET, each developer implementing user accounts had to arrive at his own design
decisions on questions like, “How do I store passwords or other sensitive
information?” and “What guidelines should I impose regarding password length and
strength?”
CreateUser
DeleteUser
GetAllUsers
GetUser
UpdateUser
ValidateUser
The Membership framework uses the provider model, which cleanly separates the
Membership framework’s API from its implementation. This enables developers to
use a common API, but empowers them to use an implementation that meets their
application’s custom needs. In short, the Membership class defines the essential
functionality of the framework (the methods, properties, and events), but does not
actually supply any implementation details. Instead, the methods of the Membership
class invoke the configured provider, which is what performs the actual work. For
example, when the Membership class’s CreateUser method is invoked, the
Membership class doesn’t know the details of the user store. It doesn’t know if users
are being maintained in a database or in an XML file or in some other store. The
Membership class examines the web application’s configuration to determine what
provider to delegate the call to, and that provider class is responsible for actually
creating the new user account in the appropriate user store. This interaction is
illustrated in Figure 3.
ASP.NET 2.0 also introduced the Roles framework. Like the Membership framework,
the Roles framework is built atop the provider model. Its API is exposed via the
Roles class and the .NET Framework ships with three provider classes:
Since the provider model includes a single forward-facing API (the Membership and
Roles classes), it is possible to build functionality around that API without having to
worry about the implementation details – those are handled by the providers
selected by the page developer. This unified API allows for Microsoft and third-party
vendors to build Web controls that interface with the Membership and Roles
frameworks. ASP.NET ships with a number of Login Web controls for implementing
common user account user interfaces. For example, the Login control prompts a user
for their credentials, validates them, and then logs them in via forms authentication.
The LoginView control offers templates for displaying different markup to anonymous
users versus authenticated users, or different markup based on the user’s role. And
the CreateUserWizard control provides a step-by-step user interface for creating a
new user account.
Underneath the covers the various Login controls interact with the Membership and
Roles frameworks. Most Login controls can be implemented without having to write a
single line of code. We will examine these controls in greater detail in future
tutorials, including techniques for extending and customizing their functionality.
Summary
All web applications that support user accounts require similar features, such as: the
ability for users to log in and have their log in status remembered across page visits;
a web page for new visitors to create an account; and the ability to the page
developer to specify what resource, data, and functionality are available to what
users or roles. The tasks of authenticating and authorizing users and of managing
user accounts and roles is remarkably easy to accomplish in ASP.NET applications
thanks to forms authentication, URL authorization, and the Membership and Roles
frameworks.
Over the course of the next several tutorials we will examine these aspects by
building a working web application from the ground up in a step-by-step fashion. In
the next two tutorial we will explore forms authentication in detail. We will see the
forms authentication workflow in action, dissect the forms authentication ticket,
discuss security concerns, and see how to configure the forms authentication system
- all while building a web application that allows visitors to log in and log out.
Happy Programming!
Further Reading
For more information on the topics discussed in this tutorial, refer to the following
resources: