Skip to main content

Authorization


This blog is a continuation of WCF security blog.

Authorization in WCF

Using Impersonation

1. Open the application that you created using WCF Security blog.

2. Let's say the application requires that the user who invokes a method is authorized to make changes to a file or write to a folder. To do this, we have to enable authorization. In the previous exercise we used the user, user2 to invoke the methods in the service. Let's now check if the user2 is authorized to write to a folder. 

3. Change the SubmitReview method in Service project as given below: 

void IProductService.SubmitReview(ProductReview pr)
{
   using (FileStream stream = new FileStream("lastMessage.xml", FileMode.Create, FileAccess.Write))
   {
     DataContractSerializer dcs = new DataContractSerializer(typeof(ProductReview));
     dcs.WriteObject(stream, pr);
   }
   Reviews.Add(pr);
}

4. Run and test the application. It should work alright now. This is because host process's identity (current user's identity) is used to invoke the SubmitReview method. To use the identity provided by the client's clientCredentials and to authorize based on the windows access control list, do the following changes to the service implementation. 

[OperationBehavior(Impersonation=ImpersonationOption.Required)]
void IProductService.SubmitReview(ProductReview pr)

5. Run and test the application again. Notice that this time it failed. Try providing access to User2 and execute the application again. 


Using Role Based Authorization

6. Create a user group in your computer and add users to the group. Use the instructions here.  

7. Do the following changes to the service implementation:

        //[OperationBehavior(Impersonation=ImpersonationOption.Required)]
        [PrincipalPermission(SecurityAction.Demand, Role="YourComputerName\\Customers")]
        void IProductService.SubmitReview(ProductReview pr)


8. Run and test. First, let the client use identity of users who are not in the group. Then, test with users who are in the group. If the user identity used by the client is not in the group then it should throw an exception on the client end. 

References and Links


Authentication and Authorization in WCF Services - Part 1 - https://msdn.microsoft.com/en-us/library/ff405740.aspx


Comments

Popular posts from this blog

A Comprehensive Evaluation of the Internal Consulting Process: Steps and Considerations

Introduction Internal consulting has emerged as a critical function within organizations, offering in-house expertise to solve complex business problems and drive change. It closely mirrors external consulting in methodology but is differentiated by the consultant's intimate knowledge of the organization and a vested interest in its long-term success. This article aims to evaluate the key steps involved in the internal consulting process, offering insights into each phase's significance and challenges. Steps in the Internal Consulting Process The internal consulting process can generally be segmented into five distinct stages: Initial Assessment, Data Collection and Analysis, Solution Development, Implementation, and Evaluation. Below is an evaluation of each step: Step 1: Initial Assessment Objective: To understand the problem or opportunity area and define the scope of the project. Significance: A well-defined scope ensures that the consulting project stays focused and manage...

The Evolving Landscape of Consulting Practice: Changes and Implications

Introduction Consulting is a field that thrives on its ability to adapt to market demands and emerging trends. As businesses evolve due to technological advancements, shifts in consumer behavior, and fluctuations in global markets, consulting practices must keep pace. This article explores some of the significant changes currently transforming the consulting industry and discusses their implications for both consultants and clients. Technological Disruption Data Analytics and Artificial Intelligence Consulting firms are increasingly integrating data analytics and artificial intelligence into their service offerings. These technologies allow consultants to offer data-driven insights that can significantly enhance strategic decision-making. This evolution means consultants now need skills in data interpretation and analysis, alongside their traditional expertise in business strategy. Virtual Consulting Platforms The advent of digital platforms enables consulting services to be offered re...

The Skillset of Internal Consultants: A Comparative Analysis

Introduction In the organizational landscape, the role of internal consultants has gained prominence due to the increasing complexity of business problems and the need for specialized in-house expertise. While many skills required for internal consulting overlap with those of external consultants, there are distinct abilities that set them apart. This article aims to compare and contrast these skill sets to provide a clearer understanding of what makes an effective internal consultant. Skills Common to Both Internal and External Consultants Problem-Solving Both types of consultants need to excel at identifying issues and creating viable solutions. Critical thinking and analytical skills are paramount for dissecting complex situations and recommending actionable strategies. Communication Excellent communication skills are a must for any consultant. Whether it’s making a presentation to stakeholders, writing a report, or simply discussing ideas with a team, effective communication is key...