Online CPU Console using a Web control Library and. NET Security (1)

Source: Internet
Author: User
Tags contains iis server hosting
Web ABSTRACT
administering applications and servers when isn't connected to the network can be a nightmare, especially when only a few PE Ople manage the application. Just Imagine going out for a evening on the town and then your ' re paged at one o ' clock in the morning with a alarming mes Sage that your application has gone down. For companies without Virtual Private Networks (VPN) The task are even more difficult now because must to the come Ce to rescue your application. Microsoft ' s. NET Framework provides easily accessible assemblies to read and modify imperative-about any information Machine, and most importantly it also provides backwards compatibility to read and modify machines, which are not. NET fr Amework enabled. In this article, Eric Rockenbach shows us how to create a CPU Console administration tool and appropriate Secuirty scheme For any machine in our network.
ARTICLE
When isn't connected to the network, administering applications and servers can is a nightmare, especially when only a few p Eople manage the application. Just Imagine going out for a evening on the town and then your ' re paged at one o ' clock in the morning with a alarming mes Sage that your application has gone down. For companies without Virtual Private Networks (VPN) The task are even more difficult now because must to the come Ce to rescue your application (VPN allows remote access of machines when both machines the have the correct software ). Microsoft ' s. NET Framework provides easily accessible assemblies to read and modify imperative-about any information Machine, and most importantly, it also provides backwards compatibility to read and modify machines which-not. NET FR Amework enabled. In this article we are to create a CPU Console administration tool and appropriate security scheme for any machine on Our network.
System Requirements
Server:windows, IIS 5.0,. NET Framework, (Server Hosting CPU Console application)
machine to be checked:windows, NT
user ' s Workstation:ie 5.0+, admin Group of Machine, Admin Group of Server, Win Login account
Assumptions
This article was designed to combine different elements of the. NET framework to meet a important business. We don't assume exposure to the assemblies mentioned, but has exposure to the. NET framework would be helpful, especial LY when expanding on this article ' s functionality.
Designing an Online CPU Console
Implementing a CPU Console over a entire network can is challenging-not only because to the cost of license fees for EV Ery machine, but also because the software must is installed on possible mission, critical machines, in which domain Admini Strators might is allowed to install un-trusted software. In addition, the console must is open to the web, which means authentication and SSL on every machine, plus an open port, Which is isn't a secure configuration to say the least. The challenge is to keep servers protected, yet still are able to administer this over the web for disconnected users.
The sample application We develop demonstrates how the. NET Framework provides a elaborate library for administering even TS, processes, and services. . NET handles the majority of the low level code this developers write to view system resources. We utilize. NET ' s ability to use the installed framework on one machine to gain access and information about another machine that does Not have the. NET Framework installed.
One of the most impressive features of the. NET Framework is it extensive robust security model. Many of. NET ' s classes now provide properties so we can ' get ' or ' set ' to administer runtime security. . NET also houses a complete assembly system.security, which features nothing but the security settings and preferences. Our CPU Console application'll capitalize on proper and efficient usage of Windows? On with. NET ' s inherent impersonation based security. We'll authenticate the user in IIS utilizing their Windows C and domain, but you'll still have to encrypt D ATA from your browser through conventional SSL methods.
Microsoft ' s ASP.net authenticated impersonation security Model.

A Web Control library (a library of the custom ASPX controls) is preferred because to its excellent reusability benefits.
building an Online CPU Console
The Users may have a variety of domains and machines, they to connect to. Consider what features would integrate the best over a web interface, given "may" of the essence to users.
Our online CPU Console consists of two projects:a Web control Library, which houses the core classes, and a asp.net web Application, which calls the Web control Library. dll. The Web control Library contains three custom Web control class files: Services, Processesand Events. asp.net Web application contains three Web forms that call the custom Web controls.
Let's take a look at the architecture's the code available for download.
Wroxcontrollib
Our Web Control library contains ready-to-use custom Web controls which in turn access events, processes, and services Any PC.
    • Eventlog.cs-custom control displaying all events in any given logs (application, system, or security), and replicates the Windows Event Viewer.
    • Process.cs-custom control displaying all processes currently running on a machine, and also stops processes by th E client. Process.cs replicates the process panel of the Task manager.
    • Services.cs-custom control displaying all services installed to any machine. Similar to Windows service Console, Services.cs also allows a user to start and stop a service.

Wroxcpuconsole
An asp.net web application which requests custom Web controls in the WROXControlLib.dll. Included in this project are the security settings allowing impersonation after IIS user authentication.
    • Vw_eventlog.aspx-requests the Eventlog.cs custom control.
    • Vw_process.aspx-requests the Process.cs custom control.
    • Vw_service.aspx-requests the Services.cs custom control.
    • Web.config-web configuration file supports ASP. NET ' s impersonation based identity and Windows authentication.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.