【正文】
seen through the eyes of and includes a handson tutorial demonstrating Windows authentication and ACL authorizations. A range of security measures and authentication methods are discussed, including basic authentication, digest authentication, and rolebased security. There39。s a necessity. Security is a big deal in work applications because by nature those applications are available to (and vulnerable to misuse by and attacks from) a larger population of users. When the work to which an application is deployed is the Inter, security bees even more important because the list of potential users grows to about four billion. Web security is a broad and plicated subject. Much of the ongoing research in the field has to do with hardening Web servers against attacks. Microsoft174。t be retrieved by unauthorized users—for example, preventing nonmanagers from viewing pages containing salary data and performance evaluations on the pany intra or preventing other people from viewing your My eBay pages. At a slightly deeper level, you might want to know who requested the page so you can personalize it for that individual. Either form of protection requires two overt actions on the part of the application: identify the originator of each request and define rules that govern who can access which pages. A Web server identifies callers using a mechanism called authentication. Once a caller is identified, authorization determines which pages that particular caller is allowed to view. supports a variety of authentication and authorization models. Understanding the options that are available to you and how they interrelate is an important first step in designing a site that restricts access to some o