Yahoo Search Busca da Web

Resultado da Busca

  1. 24 de mai. de 2015 · When Persist Security Info=False, security-sensitive information, such as the password, is not returned as part of the connection if the connection is open or has ever been in an open state. If you set Persist Security Info=True, Windows will remember the password specified in the connection string. That's the difference.

    • Overview
    • Use Windows Authentication
    • Do Not Use Universal Data Link (UDL) files
    • Avoid Injection Attacks with Connection String Builders
    • Use Persist Security Info=False
    • Encrypt Configuration Files
    • See also
    • GeneratedCaptionsTabForHeroSec

    Protecting access to your data source is one of the most important goals when securing an application. A connection string presents a potential vulnerability if it is not secured. Storing connection information in plain text or persisting it in memory risks compromising your entire system. Connection strings embedded in your source code can be read using the Ildasm.exe (IL Disassembler) to view Microsoft intermediate language (MSIL) in a compiled assembly.

    Security vulnerabilities involving connection strings can arise based on the type of authentication used, how connection strings are persisted in memory and on disk, and the techniques used to construct them at run time.

    To help limit access to your data source, you must secure connection information such as user ID, password, and data source name. In order to avoid exposing user information, we recommend using Windows authentication (sometimes referred to as integrated security) wherever possible. Windows authentication is specified in a connection string by using the Integrated Security or Trusted_Connection keywords, eliminating the need to use a user ID and password. When using Windows authentication, users are authenticated by Windows, and access to server and database resources is determined by granting permissions to Windows users and groups.

    For situations where it is not possible to use Windows authentication, you must use extra care because user credentials are exposed in the connection string. In an ASP.NET application, you can configure a Windows account as a fixed identity that is used to connect to databases and other network resources. You enable impersonation in the identity element in the web.config file and specify a user name and password.

    Avoid storing connection strings for an OleDbConnection in a Universal Data Link (UDL) file. UDLs are stored in clear text and cannot be encrypted. A UDL file is an external file-based resource to your application, and it cannot be secured or encrypted using the .NET Framework.

    A connection string injection attack can occur when dynamic string concatenation is used to build connection strings based on user input. If the user input is not validated and malicious text or characters not escaped, an attacker can potentially access sensitive data or other resources on the server. To address this problem, ADO.NET 2.0 introduced...

    The default value for Persist Security Info is false; we recommend using this default in all connection strings. Setting Persist Security Info to true or yes allows security-sensitive information, including the user ID and password, to be obtained from a connection after it has been opened. When Persist Security Info is set to false or no, security...

    You can also store connection strings in configuration files, which eliminates the need to embed them in your application's code. Configuration files are standard XML files for which the .NET Framework has defined a common set of elements. Connection strings in configuration files are typically stored inside the element in the a...

    Learn how to secure connection strings in your .NET applications using Windows authentication, connection string builders, and Persist Security Info setting. Avoid using UDL files, injection attacks, and exposing user credentials in plain text.

  2. 4 de ago. de 2016 · The Persist Security Info property specifies whether the data source can persist sensitive authentication information such as a password. The Integrated Security propery specifies the type of database authentication.

  3. Persist Security Info Valid values are True or False . When set to True, security information, such as the user identity or password previously specified on the connection string, can be obtained from the connection after the connection is made.

  4. Persist Security Info Gets or sets a Boolean value that indicates if security-sensitive information, such as the password, is not returned as part of the connection if the connection is open or has ever been in an open state.

  5. The Persist Security Info property specifies whether the data source can persist sensitive authentication information such as a password. Applies To Connection Object

  6. DB2 ConnectionStringBuilder.PersistSecurityInfo Property. Gets or sets the value indicating if security-sensitive information, such as password, can be returned as part of the connection string after the connection has been opened or if the connection has ever been in an opened state. Namespace: IBM.Data. DB2. Assembly: