Introduction
If you have an ASP. NET application with Authentication Mode set to Windows:
<authentication mode="Windows"/> <authorization> <deny users="?" /> </authorization>
Then all Windows users can access your pages but those without Windows login (from Internet) will receive an ASP. net "Access Denied 401" page. I have decided to replace this default message with some custom page. after couple of hours Googling, I found out that this is a very common problem and all the workarounds which seem to be reasonable does not work. here are some of them:
- Use a custom error page inWeb. config:
<customErrors defaultRedirect="ErrorPage.asp­x" mode="On"> <error statusCode="401" redirect="AccessDenied.aspx" /> </customErrors>
This works finestatusCode="404"
But not with 401.
- Try to catch an unauthorized request in one of the application events inGlobal. asax. CS:
protected void Application_AuthenticateRequest(Object sender, EventArgs e){ if (!Request.IsAuthenticated) Response.Redirect( "AccessDenied.aspx"); }
It is also useless, because even the browsers with valid credentials make two posts, one without credentials and havingRequest.IsAuthenticated=false
And the other one with credentials and havingRequest.IsAuthenticated=true
. Browsers without credentials make only one post. It means you are not able to determine if the first post havingRequest.IsAuthenticated=false
Comes from an unauthorized browser or not.
The Problem
Then I found an answer from a guru at Microsoft. Public. DOTNET. Framework. ASPnet. Security newsgroup.
That's correct. there's no way around that. the way wininet Authentication works is that if the resource you are requesting does not allow anonymous access, a 401 is sent back to the browser. if the resource is using Windows integrated authentication and the browser is configured to automatically send credentials, the token is sent back and the user is authenticated. in the case of basic authentication, a login prompt is displayed and the user must log in.
If you intercept the 401 and redirect somewhere, you hijack the browser's ability to challenge. There is no way around that.
Jxx cxxxxxx, MCSE, MCSD [MSFT], Developer support, ASP. NET.
Resolution
That was also the result of my research. The whole thing works like this:
- The browser sends request without credentials to the server.
- Server rejects this request and answers with "401 Access Denied ".
- Browser recognizes 401 and if it has appropriate credentials does not show this message. The second request with credentials will be posted. The requested page will be sent to the browser.
- If the browser hasNo CredentialsThe second post will not take place. The specified ed "401 Access Denied" will be shown.
The workaround is to manipulate the content of "401 Access Denied" response. the browser uses the header of this response to determine 401 case. it means we can manipulate the HTML content without influencing the whole challenge. for instance we can add the following code inApplication_EndRequest
EventGlobal. asax. CS.
protected void Application_EndRequest(Object sender, EventArgs e) { HttpContext context = HttpContext.Current; if (context.Response.Status.Substring(0,3).Equals("401")) { context.Response.ClearContent(); context.Response.Write("<script language="javascript">" + "self.location='../login.aspx';</script>"); } }
Now, the whole thing works like this:
- The browser sends request without credentials to the server.
- Server rejects this request and answers with "401 Access Denied" header + our JavaScript.
- Browser recognizes 401 and if it has appropriate credentials does not show this message. our HTML will not be rendered and JavaScript will not be executed. the second request with credentials will be posted. the requested page will be sent to the browser.
- If the browser hasNo Credentials, The second post will not take place. the specified ed "401 Access Denied" will be shown. our HTML will be rendered and JavaScript will be executed. the client side redirection will take place. the browser will show a custom 401 page.