Index
U
UDL files, 278
UIPermission class, 375
unauthorized accessdeciding how to authorize users, 87–91
defined, 54
employing file authorization, 91–93
UnIdentityPermission class, 375
Unix utilities, downloading, 214
unstructured error handling, 318–320
untainted variables, 212
UPN certificate mapping, 69–70
URL authorizationblocking HTTP verbs, 95–97
files and paths, 97–98
overview, 93
users and roles, 93–95
URL-based tokens, 117, 151
UrlEncode method, 232, 233
UrlPathEncode method, 232, 233
UrlReferrer property, 208
URLsas code group membership condition, 371
as type of evidence, 368
URLScan, 259
UrlSegmentMaxCount value, 249
UrlSegmentMaxLength value, 249
user-defined database roles, 279
user inputconstraining, 218–243
techniques for validating, 218–243
user store, 195
user weakness, on cryptographic systems, 155
UserAgent property, 208
UserHostName property, 208
usernameseasily guessed, avoiding, 11–12
limiting exposure, 15–16
reason for requiring, 3
vulnerability, 51
in web.config file, 58–61
users.See also accounts, userauthenticating, 55–86
authorizing, 86–102
educating, 42–44
empowering, 42–45
establishing credentials, 3–18
involving, 44–45, 52
limiting idle accounts, 16–18
security threat summary, 2–3