Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Architecture Decisions For Silverlight and MSSQL

Posted on 2008-06-17
2
Medium Priority
?
634 Views
Last Modified: 2008-07-02
I am trying to understand the appropriate architecture decisions and options for a new application to be developed in Silverlight with SQLServer as the back end database.

The Application will be distributed to all and Sundry who wish to use the application and the users data will be hosted in a secure centralised location.  The users are standard Internet users like you and me who use the Internet for something different everyday.

The application will run in Silverlight in the clients web browser.

I am considering using Web Services to allow the client to communicate directly with the SQL Server however the thought of having SQL Server Web Services (SODA/Native HTTP SOAP Access) directly accessible from the Internet really scares the heck out of me, not to mention I do not understand how the authentication would work.

It seems to me that if I can work out the authentication and authorisation I can just do:

<Silverlight> <--Internet--FW-->  [<MS SQL Native Web Services><SQL Server>]
(FW = Firewall)

But this seems really stupid, as I do security for a living and the thought of putting my SQL Server on the Internet (port 443/80 or otherwise only) seems pretty stupid...

So the other option seems to be:

<Silverlight> <--Internet--FW--> [<IIS><ASP.NET Web Service>] <---Local LAN--FW-->  [<MS SQL Native Web Services><SQL Server>]

Of course this now seems like a whole lot more work for very little gain....

I guess that the Silverlight Client will have to pass in a "username and password" with every Web Service Request which the ASP.NET server will verify via a web-service against the SQL Server and will then pass the request off to the SQL Server using impersonation.

The idea is that all the logic will be in the SQL Server, if something can not be done using a TransactSQL it will be done using a C# CLR, so the ASP.NET Service will merely be a pass-though proxy with some initial authentication for the username and password of the user.

Thoughts?
0
Comment
Question by:rowansmith
2 Comments
 
LVL 30

Expert Comment

by:nmcdermaid
ID: 21827204
I thought the whole point of web services was they are accessible over the internet.

And I am by no means an expert on this, but can't you just use SSL to encrypt your clear text authentication details?
0
 
LVL 11

Accepted Solution

by:
rowansmith earned 0 total points
ID: 21854846
I found this great Microsoft document:

http://www.codeplex.com/WCFSecurityGuide

Patterns & Practices - Improving Web Services Security
Scenarios and Implementation Guidance for WCF

It is only in Beta at the time of me writing this, but it really summed up everything I needed to know.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
Use Wufoo, an online form creation tool, to make powerful forms. Learn how to selectively show certain fields based on user input using rules to gather relevant information and data from your forms. The rules feature provides you with an opportunity…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question