|
|
(One intermediate revision by one other user not shown) |
Line 1: |
Line 1: |
− | = DRAFT CHEAT SHEET - WORK IN PROGRESS = | + | {{taggedDocument| type=delete| comment=Tagged via fixme/delete.}} |
− | =Introduction= | |
− | | |
− | This article is focused on providing clear, simple, actionable guidance for providing Access Control security in your applications.
| |
− | | |
− | ==What is URL Level Access Control?==
| |
− | | |
− | | |
− | =Attacks on URL Level Access Control=
| |
− | | |
− | =URL Level Access Control Issues=
| |
− | | |
− | =Access Control Anti-Patterns=
| |
− | | |
− | ==Order Specific Operations==
| |
− | | |
− | ==Never Depend on Untrusted Data==
| |
− | | |
− | =Attacking Access Controls=
| |
− | | |
− | =Testing for Broken URL Level Access Control=
| |
− | | |
− | =Defenses Against URL Level Access Control Attacks=
| |
− | | |
− | =Best Practices=
| |
− | | |
− | ==Best Practice: Code to the Activity==
| |
− | | |
− | ==Best Practice: SOMETHING==
| |
− | | |
− | ==Best Practice: SOMETHING ELSE==
| |
− | | |
− | *In Some Code
| |
− | | |
− | (code*)here
| |
− |
| |
− | *In Some other code
| |
− | | |
− | (code*)here
| |
− | | |
− | ==Best Practice: Verifying policy server-side==
| |
− | | |
− | | |
− | =SQL Integrated Access Control=
| |
− | | |
− | '''Examples'''
| |
− | | |
− | = Related Articles =
| |
− | | |
− | {{Cheatsheet_Navigation}}
| |
Latest revision as of 14:51, 15 July 2019
This page has been recommended for
deletion.
You can help OWASP by improving it or discussing it on its Talk page. See FixME Comment: Tagged via fixme/delete.