Security :: Trying To Connect Active Directory To Website?
Jan 12, 2010
i am currently trying to make a website for my internship , my assignement is to make a login procedure using date and passwords from the active directory, i'm using visual web developer 2008 express edition to make this website, does annyone know how i could get the names , functions and passwords of the users from the active directory?
I have done a small active directory application and it is working fine in my testing environment. However, When I put it on the production server, it is throwing following erroMain Error: Logon failure: unknown user name or bad password.Stack Trace :[DirectoryServicesCOMException (0x8007052e): Logon failure: unknown user name or bad password.
I am using System.directory services namespace in framework 2 to query active directory. I have used fixed user account impersonisation in the web.config file, find the code:
I have disabled anonymous access in IIS. Also i have given Read & write access to the account tang09 for the website virtual directory and Microsoft.NET folder located in windows folder. But still i get prompted for the domain username and password to access the website.
This is fine for the userid textbox but I would like to pull the persons name as well which would be stored in Active Directory. I'm still really new to asp and c# so I'm not sure how to connect to active directory and then pull the information I need.
I want to learn how to add/delete/update account (including adding mail boxes for new users). Can someone point to a good book where I can begin from. I want to start with some real basics and build from there.
have a probleme with my search filter, i want to list the users of an organizational unit result.filter =(& (objectClass= user)(ou=dep1)); ====> it didn't work for me
I need to list a group of users, their group name is (IRS Group) to a list group. how to do this. I'm very new to asp.net and dont have much knowlegde about acctive directory.
I am updating some CS code that was written in 2004, and that references some assemblies which extract user data from AD by query filtering on the user's title. I can't test my updated code in VS2010 because the assemblies no longer compile - the references are no longer valid (I can't create a DirectoryEntry or DirectorySearcher) so I need to work out how to replace the code with current directoryservices.accountmanagement namespace properties and methods. I have searched around but don't seem to be getting anywhere. give me some code that will work with vs 2010 to replicate the following:
I have a problem with saving some data into extensionattribute in AD.There is no problem with saving data into properties like "Mobile" or "SN" but when I try to save data into one of extensionAttribute , for example: extensionAttribute7 , I get an error "The attribute syntax specified to the directory service is invalid".There is no problems of read data from extension Attributes.
I am looking at displaying certain information from Active Directory within an ASP.NET web page/application to allow users of my organisation to update thCe specified fields. I have searched the internet for help and found windows forms based information, but nothing to really help me with ASP.NET, and anything that could possibly be of any assistance to me is written in C#. I have already built a logon form that hands forms based authentication against AD, and now want to display that authenticated user information.
I have read countless forums and found nothing so for so apparently what I need is an unusual request.I need a code snippet that will iterate through an AD domain account and display all properties for a given user.Has anyone ever built such a script?
If there is a code snippet that displays just the available properties of a user object, this would be sufficient. I am trying to build an application to add users to our LDAP and need to populate all our specific values however I don't have the specific property names to populate.
I'm looking at starting a new web app which needs to be secure (if for no other reason than that we'll need PCI (Payment Card Industry) accreditation at some point). From previous experience working with PCI (on a domain), the preferred method is to use integrated windows authentication which is then passed all the way through the app to the database using kerberos (so the NT user has permissions in the DB). This allows for better auditing as well as object-level permissions (ie an end user can't read the credit card table). There are advantages in that even if someone compromises the webserver, they won't be able to glean any/much additional information from the database. Also, the webserver isn't storing any database credentials (beyond perhaps a simple anonymous user with very few permissions for simple website config)
So, now I'm looking at the new web app which will be on the public internet. One suggestion is to have a Active Directory server and create windows accounts on the AD for each user of the site. These users will then be placed into the appropriate NT groups to decide which DB permissions they should have (and which pages they can access). ASP.Net already provides the AD membership provider and role provider so this should be fairly simple to implement. There are a number of questions around this - Scalability, reliability, etc... and I was wondering if there is anyone out there with experience of this approach or, even better, some good reasons why to do it / not to do it.