Oldest pages

From Guidance Share
Jump to navigationJump to search

Showing below up to 50 results in range #1 to #50.

View (previous 50) () (20 | 50 | 100 | 250 | 500).

  1. ASP.NET 1.1 Performance Checklist‏‎ (07:38, 13 October 2006)
  2. ASP.NET 2.0 Code Examples‏‎ (04:11, 15 October 2006)
  3. What's new in ASP.NET 2.0 in terms of Authentication?‏‎ (05:23, 16 October 2006)
  4. How do I decide my Authentication strategy in ASP.NET?‏‎ (05:24, 16 October 2006)
  5. How do I use Forms Authentication with SQL Server database?‏‎ (05:24, 16 October 2006)
  6. How do I use Forms Authentication with Active Directory?‏‎ (05:24, 16 October 2006)
  7. How do I enable Forms Authentication to work with multiple Active Directory domains?‏‎ (05:25, 16 October 2006)
  8. How do I protect Forms Authentication?‏‎ (05:25, 16 October 2006)
  9. How do I enforce strong passwords using membership feature in ASP.NET 2.0‏‎ (05:31, 16 October 2006)
  10. How do I protect passwords in user store?‏‎ (05:32, 16 October 2006)
  11. What are the issues with Forms Authentication in Web Farm Scenario?‏‎ (05:32, 16 October 2006)
  12. How do I implement single sign on using forms authentication?‏‎ (05:32, 16 October 2006)
  13. How do I use my custom user / identity store with forms authentication?‏‎ (05:33, 16 October 2006)
  14. How do I configure account lockout using membership feature in ASP.Net 2.0?‏‎ (05:33, 16 October 2006)
  15. When and how do I use windows authentication in ASP.NET 2.0?‏‎ (05:33, 16 October 2006)
  16. When and how do I use Kerberos authentication in ASP.NET 2.0?‏‎ (05:34, 16 October 2006)
  17. What's new in ASP.NET 2.0 in terms of Authorization?‏‎ (05:43, 16 October 2006)
  18. What is the difference between URL authorization, File authorization and Role authorization??‏‎ (05:44, 16 October 2006)
  19. How do I use URL Authorization in ASP.NET 2.0?‏‎ (05:44, 16 October 2006)
  20. How do I use File Authorization in ASP.NET 2.0?‏‎ (05:44, 16 October 2006)
  21. How do I use Role Authorization in ASP.NET 2.0?‏‎ (05:44, 16 October 2006)
  22. How is the AuthorizationStoreRoleProvider different from Authorization Manager APIs?‏‎ (05:45, 16 October 2006)
  23. How do I use Windows Groups for role authorization in ASP.NET 2.0?‏‎ (05:45, 16 October 2006)
  24. How do I use my custom role store for roles authorization?‏‎ (05:45, 16 October 2006)
  25. How do I cache roles in ASP.NET 2.0?‏‎ (05:46, 16 October 2006)
  26. How do I protect authorization cookie when using role caching in ASP.NET 2.0?‏‎ (05:46, 16 October 2006)
  27. How do I lock authorization settings?‏‎ (05:46, 16 October 2006)
  28. How do I use RoleManager in my application?‏‎ (05:47, 16 October 2006)
  29. ASP.NET 2.0 Security FAQs‏‎ (05:50, 16 October 2006)
  30. How do I use the Health monitoring feature in ASP.NET 2.0?‏‎ (06:14, 16 October 2006)
  31. What's new in ASP.NET 2.0 in terms of Auditing and Logging?‏‎ (06:15, 16 October 2006)
  32. What security events does health monitoring log by default?‏‎ (06:15, 16 October 2006)
  33. How do I instrument my application for security?‏‎ (06:15, 16 October 2006)
  34. When writing to a new event source from my ASP.NET application running under the Network service security context, I get registry permission exception. Why is this and how do I correct this‏‎ (06:16, 16 October 2006)
  35. How do I protect audit and log files?‏‎ (06:16, 16 October 2006)
  36. What's new in ASP.NET 2.0 in terms of Code Access Security?‏‎ (06:17, 16 October 2006)
  37. How do I use code access security with ASP.NET?‏‎ (06:17, 16 October 2006)
  38. How do I create a custom trust level for ASP.NET?‏‎ (06:17, 16 October 2006)
  39. What are the permissions at the various trust levels?‏‎ (06:18, 16 October 2006)
  40. How do I write partial trust applications?‏‎ (06:18, 16 October 2006)
  41. When should I put assemblies in GAC, what are security implications?‏‎ (06:18, 16 October 2006)
  42. When do I use impersonation in ASP.NET 2.0?‏‎ (06:29, 16 October 2006)
  43. How do I impersonate the original caller?‏‎ (06:29, 16 October 2006)
  44. How do I temporarily impersonate the original caller?‏‎ (06:30, 16 October 2006)
  45. How do I impersonate a specific (fixed) identity?‏‎ (06:30, 16 October 2006)
  46. When should I use programmatic impersonation?‏‎ (06:31, 16 October 2006)
  47. How do I use programmatic impersonation?‏‎ (06:31, 16 October 2006)
  48. What is protocol transition and when do I care?‏‎ (06:31, 16 October 2006)
  49. What is Constrained Delegation?‏‎ (06:31, 16 October 2006)
  50. How can I retain impersonation in the new thread created from ASP.NET application?‏‎ (06:32, 16 October 2006)

View (previous 50) () (20 | 50 | 100 | 250 | 500).