ASP.NET Forms Authentication - Part 1
by Abel Banda01/06/2003
Introduction
Often, in legacy Web applications, users authenticate themselves via a Web form. This Web form submits the user's credentials to business logic that determines their authorization level. Upon successful authentication, the application then submits a ticket in the form of a cookie, albeit a hard cookie or session variable. This ticket contains anything from just a valid session identification access token to customized personalization values.
ASP.NET encompasses and extends the very same logic described above into its architecture as an authentication facility, Forms Authentication. Forms Authentication is one of three authentication providers. Windows Authentication and Passport Authentication make up the other two providers. In this article, we will focus on Forms Authentication.
Forms Authentication is a system in which unauthenticated requests are redirected to a Web form where users are required to provide their credentials. Upon submitting the form, and being properly verified by your application, an authorization ticket is issued by your Web application in the form of a cookie. This authorization cookie contains the user's credentials or a key for reacquiring the user's identity (e.g. therefore making the identity persistent). In essence, Forms Authentication is a means for wrapping your Web application around your own login user interface and verification processes.
|
Related Reading
.NET Windows Forms in a Nutshell |
Forms Authentication Flow
- A client generates a request for a protected resource (e.g. a secured page from your site).
- IIS (Internet Information Server) receives the request. If the requesting client is authenticated by IIS, the user/client is passed on to the ASP.NET application. Note that if Anonymous Access is enabled, the client will be passed onto the ASP.NET application by default. Otherwise, Windows will prompt the user for credentials to access the server's resources. Also note that because the authentication mode in the ASP.NET application is set to Forms, IIS authentication cannot be used.
- If the client doesn't contain a valid authentication ticket/cookie, ASP.NET will redirect the user to the URL specified in the loginURL attribute of the Authentication tag in your web.config file. This URL should contain the login page for your application. At this URL, the user is prompted to enter their credentials to gain access to the secure resource.
- The client must provide credentials, which are then authenticated/processed by your ASP.NET application. Your ASP.NET application also determines the authorization level of the request, and, if the client is authorized to access the secure resource, an authentication ticket is finally distributed to the client. If authentication fails, the client is usually returned an Access Denied message.
- The client can then be redirected back to the originally-requested resource, which is now accessible, provided that the client has met the authentication and authorization prerequisites discussed above. Once the authorization ticket/cookie is set, all subsequent requests will be authenticated automatically until the client closes the browser or the session terminates. You can have the user's credentials persist over time by setting the authorization ticket/cookie expiration value to the date you desire to have the credentials persist through. After that date, the user will have to log in again.
Setting Up Forms Authentication
Let's take a look at the applicable settings to execute Forms Authentication. In general, setting up Forms Authentication involves just a few simple steps.
- Enable anonymous access in IIS. By default, anonymous users should be allowed to access your Web application. In rare cases, however, you may opt to layer an Integrated Windows OS security layer level with Forms authentication. We will discuss how to integrate this layer with anonymous access enabled in the article succeeding this one ("Part 2 (Integration w/ Active Directory)").
- Configure your Web application's
web.config file to use Forms Authentication.
Start by setting the authentication mode attribute to Forms,
and denying access to anonymous users. The following example shows how this
can be done in the web.config file for your Web application:
<configuration> <system.web> <authentication mode="Forms"> <forms name=".COOKIEDEMO" loginUrl="login.aspx" protection="All" timeout="30" path="/"/> </authentication> <authorization> <deny users="?" /> </authorization> </system.web> </configuration>Upon setting the
authentication modetoForms, you'll notice that we appended another child element. TheFormselement has five attributes that implement your forms authentication configuration. The attributes and their descriptions are as follows :Attribute Description nameThis is the name of the HTTP cookie from which we will store our authentication ticket and information, respectively. loginURLThis is the URL from which your unauthenticated client will be redirected. In most scenarios, this would be your login page, where the client is required to provide their credentials for authentication. protectionThis is used to set the method from which to protect your cookie data. The following valid values can be supplied:
All: Specifies to use both data validation and encryption to protect the cookie. Triple DES is used for encryption, if it is available and if the key is long enough (48 bytes). TheAllvalue is the default (and suggested) value.
None: Used for sites that are only using cookies for personalization and have weaker requirements for security. Both encryption and validation can be disabled. This is the most efficient performance wise, but must be used with caution.
Encryption: Specifies that the cookie is encrypted using Triple DES or DES, but data validation is not done on the cookie. It's important to note that this type of cookie is subject to chosen plaintext attacks.
Validation: Specifies to avoid encrypting the contents of the cookie, but validate that the cookie data has not been altered in transit. To create the cookie, the validation key is concatenated in a buffer with the cookie data and a MAC is computed/appended to the outgoing cookie.timeoutThis is the amount of time (in integer minutes) that the cookie has until it expires. The default value for this attribute is 30(thus expiring the cookie in 30 minutes).
The value specified is a sliding value, meaning that the cookie will expirenminutes from the time the last request was received.pathThis is the path to use for the issued cookie. The default value is set to " /" to avoid issues with mismatched case in paths. This is because browsers are case-sensitive when returning cookies.In our web.config file, it's also important to note the value we have for the
denychild element of theauthorizationsection (as highlighted below). Essentially, we set that value of theusersattribute to "?" to deny all anonymous users, thus redirecting unauthenticated clients to theloginURL.<configuration> <system.web> <authentication mode="Forms"> <forms name=".COOKIEDEMO" loginUrl="login.aspx" protection="All" timeout="30" path="/"/> </authentication> <authorization> <deny users="?" /> </authorization> </system.web> </configuration> -
Create your login page (as
referenced in the
loginURLattribute discussed above). In this case, we should save our login page as login.aspx. This is the page to where clients without valid authentication cookie will be redirected. The client will complete the HTML form and submit the values to the server. You can use the example below as a prototype.<%@ Import Namespace="System.Web.Security " %> <html> <script language="C#" runat=server> void Login_Click(Object sender, EventArgs E) { // authenticate user: this sample accepts only one user with // a name of username@domain.com and a password of 'password' if ((UserEmail.Value == "username@domain.com") && (UserPass.Value == "password")) { FormsAuthentication.RedirectFromLoginPage(UserEmail.Value, PersistCookie.Checked); } else { lblResults.Text = "Invalid Credentials: Please try again"; } } </script> <body> <form runat="server"> <h3>Login Page</h3> <hr> Email:<input id="UserEmail" type="text" runat="server"/> <asp:RequiredFieldValidator ControlToValidate="UserEmail" Display="Static" ErrorMessage="*" runat="server"/> <p>Password:<input id="UserPass" type="password" runat="server"/> <asp:RequiredFieldValidator ControlToValidate="UserPass" Display="Static" ErrorMessage="*" runat="server"/> <p>Persistent Cookie:<ASP:CheckBox id="PersistCookie" runat="server" /> <p><asp:button id="cmdLogin" text="Login" OnClick="Login_Click" runat="server"/> <p><asp:Label id="lblResults" ForeColor="red" Font-Size="10" runat="server" /> </form> </body> </html>It's important to note that the above page authenticates the client on the click event of the
cmdLoginbutton. Upon clicking, the logic determines if the username and password provided match those hard-coded in the logic. If so, the client is redirected to the requested resource. If not, the client is not authorized, and thus receives a message depicting this.You can adjust the logic to fit your needs, as it is very likely that you will not have your usernames and passwords hard-coded into the logic. It is here at the
Login_Clickfunction that you can substitute the logic with that of your own. It is common practice to substitute database logic to verify the credentials against a data table with a stored procedure.You can also provide authorized credentials in the web.config file. Inside the forms section, you would append a user element(s), as follows :
<configuration> <system.web> <authentication mode="Forms"> <forms name=".COOKIEDEMO" loginUrl="login.aspx" protection="All" timeout="30" path="/"> <credentials passwordFormat="Clear"> <user name="user1" password="password1"/> <user name="user2" password="password2"/> <user name="user3" password="password3"/> </credentials> </forms> </authentication> <authorization> <deny users="?" /> </authorization> </system.web> </configuration>
cmdLogin button discussed above.
Here is the code :
void Login_Click(Object sender, EventArgs E)
{
// authenticate user: this sample authenticates
// against users in your app domain's web.config file
if (FormsAuthentication.Authenticate(UserEmail.Value,
UserPass.Value))
{
FormsAuthentication.RedirectFromLoginPage(UserEmail.Value,
PersistCookie.Checked);
}
else
{
lblResults.Text = "Invalid Credentials: Please try again";
}
}
Client Requirements
To enable forms authentication, cookies must be enabled on the client browser. If the client disables cookies, the cookie generated by Forms Authentication is lost and the client will not be able to authenticate.
Coming in Next Part of This Series
In the next part of this series, we'll discuss how to incorporate Active Directory with Forms Authentication, to get that Windows OS layer of security without forcing the user to authenticate twice, once through your user interface and again through the Windows user interface.
Return to ONDotnet.com
-
authentication and authorization
2008-05-12 02:09:49 wllm.ftzgrld1 [View]
-
authentication and authorization
2008-07-13 19:10:41 topnaja [View]
-
which one is better
2007-01-24 16:22:49 boa_sovann [View]
-
printing coding
2006-12-28 04:01:16 puducherry [View]
-
Can we use multiple login form
2006-09-21 22:36:19 Sumit_Ranjan [View]
-
Can we use multiple login form
2007-01-21 16:50:36 boa_sovann [View]
-
Can we use multiple login form
2010-02-19 03:58:26 rubali [View]
-
Can we use multiple login form
2010-02-19 03:57:56 rubali [View]
-
Can we use multiple login form
2010-02-19 03:55:36 rubali [View]
-
Can we use multiple login form
2007-01-21 16:42:47 boa_sovann [View]
-
Can we use multiple login form
2006-10-08 05:45:03 manisha123 [View]
-
Can we use multiple login form
2006-10-04 20:43:18 jcmweb [View]
- Trackback from http://www.dotnetjunkies.com/WebLog/dunderwood/archive/2005/08/26/132162.aspx
Building a Secure Application in ASP.NET (AD auth)
2005-08-26 05:28:17 [View]
-
forms authentication won't work
2004-06-18 09:43:19 petermonadjemi [View]
-
forms authentication won't work
2006-11-20 20:47:00 kamalmca [View]
-
Emergency-Form level authentication
2004-02-03 23:05:34 mohsen_ja [View]
-
Emergency-Form level authentication
2004-06-03 09:02:25 WayneSO [View]
-
Little problem
2004-01-30 04:52:52 hamid1 [View]
-
Little problem
2004-04-05 12:49:43 chrisii [View]
- Trackback from http://weblogs.asp.net/jlerman/archive/0001/01/01/49003.aspx
For newbies on Forms Authentication
2004-01-09 06:49:23 [View]
- Trackback from http://weblogs.asp.net/jlerman/archive/2004/01/09/49003.aspx
For newbies on Forms Authentication
2004-01-09 06:12:25 [View]
-
Well Done
2004-01-06 10:22:57 anonymous2 [View]
-
ASP.NET Forms Authentication
2003-11-26 12:33:14 sergeir [View]
-
ASP.NET Forms Authentication
2005-08-13 01:08:50 c#.asp.net [View]
-
ASP.NET Forms Authentication
2003-12-11 18:56:42 fleminga [View]
-
ASP.NET Forms Authentication
2004-06-10 16:44:44 altanic [View]
-
It's Perfect
2003-09-29 09:23:03 anonymous2 [View]
-
UserEmail
2003-09-16 13:40:43 anonymous2 [View]
-
UserEmail
2003-10-13 09:41:56 anonymous2 [View]
-
Part 2 On Its Way!
2003-08-13 02:13:22 anonymous2 [View]
-
Good Article
2003-07-09 19:27:25 anonymous2 [View]
-
Cool
2003-07-09 11:59:29 anonymous2 [View]
-
time out
2003-06-26 21:04:52 anonymous2 [View]
-
time out
2006-05-04 04:32:00 Mino [View]
-
can not login in unsecured zone
2003-06-05 11:02:34 anonymous2 [View]
-
can not login in unsecured zone
2006-02-19 03:30:44 Wiggy [View]
-
Clear
2003-05-29 20:08:45 anonymous2 [View]
-
Good job man!
2003-04-28 22:29:45 anonymous2 [View]
-
Nice!
2003-04-03 21:25:12 anonymous2 [View]
-
Concise and to the point
2003-01-21 21:40:13 anonymous2 [View]
-
Part 2 On Its Way!
2003-01-16 21:14:03 abelbanda.com [View]
-
web config file -- selective authentication
2006-11-17 13:14:53 justlife [View]
-
Part 2 On Its Way!
2003-08-13 02:09:34 anonymous2 [View]
-
When is Part 2 coming?!
2003-01-16 18:19:40 anonymous2 [View]
-
Great Overview!
2003-01-12 22:53:14 anonymous2 [View]
-
Solid, compact, and in-depth coverage!
2003-01-07 09:26:51 anonymous2 [View]

