【正文】
tutorial demonstrating Windows authentication and ACL authorizations. A range of security measures and authentication methods are discussed, including basic authentication, digest authentication, and rolebased security. There39。s important and you know you must do it sooner or later, but you put it off as long as you can and when you finally do it, you do so only because you have to. You might not go to jail for building insecure applications, but security is no less important because of it. In many applications—Web applications in particular—security isn39。 it39。 Inter Information Services (IIS) administrators are all too aware of the past security holes in IIS and of several patches and security updates from Redmond. But this article isn39。 rather, this article is about using to build secure sites that serve up pages only to authorized users. Most sites built with fall into one of three categories:Sites whose content is freely available to everyone. Inter sites that serve the general population but require a login before displaying certain pages. eBay is a great example of such a site. Anyone can browse eBay and view the ongoing auctions, but when you place a bid, eBay requires a user name and password. eBay also has a feature named My eBay that lets you review the auctions you39。s employees—who have accounts in a Windows174。ll learn how integrates with IIS and Windows and how the three can be bined to protect resources using Windows authentication and access control list (ACL) file authorizations. Part two of this article will cover forms authentication—a cool new feature of that lets you secure sites using a bination of formbased logins and URL resource authorizations. Und