<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Raj28+3</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Raj28+3"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Raj28_3"/>
		<updated>2026-04-28T23:25:52Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Reviewing_Code_for_Authentication&amp;diff=14018</id>
		<title>Reviewing Code for Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Reviewing_Code_for_Authentication&amp;diff=14018"/>
				<updated>2006-12-07T11:01:18Z</updated>
		
		<summary type="html">&lt;p&gt;Raj28 3: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''Introduction''' ==&lt;br /&gt;
“Who are you?” Authentication is the process where an entity proves the identity of another entity, typically through credentials, such as a user name and password.&lt;br /&gt;
&lt;br /&gt;
Depending on your requirements, there are several available authentication mechanisms to choose from. If they are not correctly chosen and implemented, the authentication mechanism can expose vulnerabilities that attackers can exploit to gain access to your system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Authentication''' ==&lt;br /&gt;
In the .NET, there is Authentication tags in the configuration file. &lt;br /&gt;
&lt;br /&gt;
The &amp;lt;'''authentication'''&amp;gt; element configures the authentication mode that your applications use.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;'''authentication'''&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The appropriate authentication mode depends on how your application or Web&lt;br /&gt;
service has been designed. The default Machine.config setting applies a secure&lt;br /&gt;
Windows authentication default as shown below.&lt;br /&gt;
&lt;br /&gt;
''' authentication Attributes:mode=&amp;quot;[Windows|Forms|Passport|None]&amp;quot; '''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;authentication mode=&amp;quot;Windows&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' Forms Authentication Guidelines '''&lt;br /&gt;
To use Forms authentication, set mode=“Forms” on the &amp;lt;authentication&amp;gt; element.&lt;br /&gt;
Next, configure Forms authentication using the child &amp;lt;forms&amp;gt; element. The&lt;br /&gt;
following fragment shows a secure &amp;lt;forms&amp;gt; authentication element configuration:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;authentication mode=&amp;quot;Forms&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;forms loginUrl=&amp;quot;Restricted\login.aspx&amp;quot;      Login page in an SSL protected folder&lt;br /&gt;
       protection=&amp;quot;All&amp;quot;                      Privacy and integrity&lt;br /&gt;
       requireSSL=&amp;quot;true&amp;quot;                     Prevents cookie being sent over http&lt;br /&gt;
       timeout=&amp;quot;10&amp;quot;                          Limited session lifetime&lt;br /&gt;
       name=&amp;quot;AppNameCookie&amp;quot;                  Unique per-application name&lt;br /&gt;
       path=&amp;quot;/FormsAuth&amp;quot;                     and path&lt;br /&gt;
       slidingExpiration=&amp;quot;true&amp;quot; &amp;gt;            Sliding session lifetime&lt;br /&gt;
&amp;lt;/forms&amp;gt;&lt;br /&gt;
&amp;lt;/authentication&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use the following recommendations to improve Forms authentication security:&lt;br /&gt;
* Partition your Web site.&lt;br /&gt;
* Set protection=“All”.&lt;br /&gt;
* Use small cookie time-out values.&lt;br /&gt;
* Consider using a fixed expiration period.&lt;br /&gt;
* Use SSL with Forms authentication.&lt;br /&gt;
* If you do not use SSL, set slidingExpiration = “false”.&lt;br /&gt;
* Do not use the &amp;lt;credentials&amp;gt; element on production servers.&lt;br /&gt;
* Configure the &amp;lt;machineKey&amp;gt; element.&lt;br /&gt;
* Use unique cookie names and paths.&lt;/div&gt;</summary>
		<author><name>Raj28 3</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=14016</id>
		<title>OWASP Code Review Guide Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=14016"/>
				<updated>2006-12-07T10:02:01Z</updated>
		
		<summary type="html">&lt;p&gt;Raj28 3: /* Examples by Vulnerability */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Methodology==&lt;br /&gt;
&lt;br /&gt;
#[[Code Review Introduction|Introduction]]&lt;br /&gt;
&lt;br /&gt;
NOTE: The following two sections seem to describe quality code review processes, not specifically focused on security. Security code reviews are somewhat different as they require an understanding of the threat model.&lt;br /&gt;
&lt;br /&gt;
#[[Steps and Roles]]&lt;br /&gt;
#[[Code Review Processes]]&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;br /&gt;
&lt;br /&gt;
==[[Design review]] ==&lt;br /&gt;
&lt;br /&gt;
==Examples by Vulnerability==&lt;br /&gt;
#[[Buffer Overruns and Overflows|Buffer Overruns and Overflows]]&lt;br /&gt;
#[[OS Injection]]&lt;br /&gt;
#[[Reviewing Code for SQL Injection|SQL Injection]]&lt;br /&gt;
#[[Data Validation (Code Review)|Data Validation]]&lt;br /&gt;
#[[Error Handling]]&lt;br /&gt;
#[[The Secure Code Environment]]&lt;br /&gt;
#[[Transaction Analysis]]&lt;br /&gt;
#[[Authorization]]&lt;br /&gt;
#[[Authentication (Code review)|Authentication]]&lt;br /&gt;
#[[Session Integrity]]&lt;br /&gt;
#[[Cryptography]]&lt;br /&gt;
&lt;br /&gt;
== Language specific best practice ==&lt;br /&gt;
&lt;br /&gt;
===Java===&lt;br /&gt;
#[[Inner classes]]&lt;br /&gt;
#[[Class comparison]]&lt;br /&gt;
#[[Cloneable classes]]&lt;br /&gt;
#[[Serializable classes]]&lt;br /&gt;
#[[Package scope and encapsulation]]&lt;br /&gt;
#[[Mutable objects]]&lt;br /&gt;
#[[Private methods &amp;amp; circumvention]]&lt;br /&gt;
&lt;br /&gt;
===.NET===&lt;br /&gt;
&lt;br /&gt;
===PHP===&lt;br /&gt;
&lt;br /&gt;
==[[Automating Code Reviews]] ==&lt;br /&gt;
&lt;br /&gt;
==[[References]]==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;/div&gt;</summary>
		<author><name>Raj28 3</name></author>	</entry>

	</feed>