Security

Previous Topic Next Topic

An End-to-End Troubleshooting Example

In the following scenario, a travel site called Exploration Air has developed a Web-based employee benefits application that uses IIS 5.0. The application can be accessed from the Internet and corporate intranet. Because the application is open to the Internet, security must be high.

All employees are validated before gaining access to the server and all data is encrypted to prevent people from “sniffing” the data as it moves across the Internet. The benefits application in this scenario deals with medical, dental, and legal assistance, as well as stock options, stock purchase plans, investment, and relocation benefits.

To access these resources, the Web application requires data from several sources:

Anatomy of Web Application Benefits at Exploration Air

This scenario describes eight main steps, which are depicted in Figure the figure above:

  1. The user logs on.
  2. An ISAPI authentication filter is called.
  3. IIS 5.0 attempts to authenticate the user.
  4. IIS 5.0 loads the logon page Logon.asp.
  5. Logon.asp attempts to read data from the configuration store.
  6. ADO performs a lookup on the Human Resources page.
  7. A data access component written in Microsoft® Visual Basic® 5.0 performs a complex update.
  8. The page count is updated using a Page Count component.

In each step, issues that could prevent you from proceeding to the next step are outlined.

See the following:


© 1997-1999 Microsoft Corporation. All rights reserved.