Web application security - the fast guide 1.1 | Page 18

Chapter 1 - information Security overview P a g e | 18 Request Session info Session info Session info SessionID Client1 Response SessionID Request Response Client2 Request Web server Response SessionID Client3 Figure 9: Session Management b. Authentication: Is the method used to identify the user trying to access the application, normally anonymous unauthenticated personnel are treated as guest and provided with specific level of access depending on the nature of the application. The simplest approach to apply authentication in web application is usually through user name and password combination. The provided credentials should abide a set of conditions to minimize the possibility of guessing those credentials. More critical web application should be depending on extra credentials like challenge codes, smart & magnetic cards or biometric approaches Figure 10: Credentials based on Smart card, Biometrics and one time password c. Access control: Authentication of users accessing the applications is only the first step that will pave to control different users access to application resources and functionalities. This task is called “Authorization” and it means to specify “WHO” access “WHAT”.