
Please use this identifier to cite or link to this item:
http://hdl.handle.net/123456789/23724
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Imran Aziz | - |
dc.date.accessioned | 2023-04-07T04:01:53Z | - |
dc.date.available | 2023-04-07T04:01:53Z | - |
dc.date.issued | 1999 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/23724 | - |
dc.description.abstract | This report describes in detail the working of IIS authentication schemes and its limitations. On the basis of these limi!ations it suggests a custom authentication scheme. It fu rther explains the working of ISAPI fil ters to create custom authentication and logging capabilities. It contaii1s a detailed discussion on an administrative interface similar to the Windows NT user domain system to create users and group accounts and a way to protect the selected directory by username / password, IP address, referripg URL and domain name. The report also dt'scribes the logging capability provided by the custom software and the method to enable and view it effectively. These logging capabilities are those which are not covered by the Windows NT logging and are specific to authentication needs. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Quaid i Azam University | en_US |
dc.subject | Computer Sciences | en_US |
dc.title | Authentication and Logging Software (Filter) on IIS (Windows NT) | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | M.Sc |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
COM 560.pdf | COM 560 | 12.18 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.