1 <?xml version="1.0" encoding="iso-8859-1"?> 2 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" 3 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> 4 <html xmlns="http://www.w3.org/1999/xhtml"> 5 <head> 6 <title>Securing a WebStack Application</title> 7 <meta name="generator" content="amaya 8.1a, see http://www.w3.org/Amaya/" /> 8 <link href="styles.css" rel="stylesheet" type="text/css" /> 9 </head> 10 11 <body> 12 <h1>Securing a WebStack Application</h1> 13 14 <p>Making sure that Web applications are "secure" involves many different 15 aspects of application design, deployment and administration. This document 16 covers only the usage of the authentication features of the WebStack API.</p> 17 18 <h2>Authentication in WebStack</h2> 19 20 <p>There are two principal methods of introducing authentication and applying 21 access control to WebStack applications:</p> 22 <ul> 23 <li>Use of authenticators, where the "remote user" is set in the 24 server/framework environment and tested in the application.</li> 25 <li>Use of the <code>WebStack.Resources.LoginRedirect</code> and 26 <code>WebStack.Resources.Login</code> modules.</li> 27 </ul> 28 29 <h2>Choosing an Authentication Strategy</h2> 30 <ul> 31 <li><a href="authenticators.html">Application-Wide Authenticators</a></li> 32 <li><a href="login-redirect.html">LoginRedirect and Login Modules</a></li> 33 </ul> 34 </body> 35 </html>