Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Requirements
Contents
Active Directory (AD) Authentication Application Requirements ................................................................ 1
Overview ....................................................................................................................................................... 2
Requirements................................................................................................................................................ 2
Development Environment....................................................................................................................... 2
Coding Language ....................................................................................................................................... 2
Database ................................................................................................................................................... 2
Application Type ....................................................................................................................................... 2
Third-Party Libraries.................................................................................................................................. 2
Design........................................................................................................................................................ 2
Client Code ............................................................................................................................................ 2
Server Code ........................................................................................................................................... 3
Database ............................................................................................................................................... 4
Deliverables................................................................................................................................................... 4
Version History.............................................................................................................................................. 4
Overview
This document sets forth requirements for a simple application that will use LDAP (more specifically
Active Directory, AD) for authentication. The application requires the user to login with username and
password. Authentication credentials are passed to a (configurable) LDAP end point, which determines
whether or not the user is authenticated.
This application serves to demonstrate that a MVC application may authenticate with Active Directory,
permitting a user to sign in with AD credentials rather than credentials stored in a user store specific to
that application.
Requirements
Development Environment
Visual Studio 2015 or later
Coding Language
C#/.NET.
Database
MS SQL 2008 or later
Application Type
MVC
Third-Party Libraries
Any third-party libraries, tools or add-ons used in this design must be authorized in advance by Employer
to ensure that they fit within Employer cost and security policies.
Design
As a MVC application, this design includes client- and server-side code.
Client Code
Client code presents a HTML UI with two tabs:
1. Configuration tab
a. The configuration tab contains entries permitting the user to configure the
following information:
Server Code
Some behaviors of View and Controller (the ‘VC’ in MVC) are largely implied by other
requirements in this document. This section is not a comprehensive detail of server
code; rather it highlights server-side code (primarily View and Model) behavior
specifically tied to client-side button-click events defined in the Client Code section.
1. Configuration Save – when a user saves LDAP configuration information (see Client
Code Section 1bi), the information should be stored to a SQL table.
2. User Authentication – when a user submits credentials for authentication (see Client
Code Section 2b), the LDAP configuration information stored in SQL, along with
credentials passed upon user login form submit, are used to construct a LDAP query
string to request authentication from the configured LDAP end point.
Database
Developer may use any SQL table structure that makes sense to achieve necessary
functionality. However, developer may not use SQL stored procedures of database logic;
SQL is to be used only as a repository for data, not a logic engine.
Deliverables
Upon project completion, developer will provide:
Version History