Skip to main content

91 Best WCF Security Questions and Answers [Interview Q/A]

Design Considerations Q/A :-

How do you decide on an authentication strategy? How do you decide on an authorization strategy?
When should you use message security vs transport security? How do you use Active Directory infrastructure?
What bindings should you use over Internet? What bindings should you use over Intranet?
When should you impersonate the original caller? How do you migrate to WCF from a COM, DCOM and WSE application?
How do you migrate to WCF from an ASMX Web service? What is the difference between resource-based, roles-based, and claims-based authorization?

Auditing and Logging Q/A:-

How do you protect my log files? What events should be logged in WCF service security?
How do you enable logging and auditing in WCF? How do you stop my service, if there has been an auditing failure?
How do you log important business events in WCF? How do you implement log throttling in WCF?
How do you use the health monitoring feature with WCF? How do you pass user identity information in a message for auditing purpose?

Authentication Q/A :-

How do you decide on a WCF authentication strategy? When should you use the SQL Server membership provider?
How do you authenticate against Active Directory? How do you authenticate against a SQL store?
How do you authenticate against a custom store? How do you protect passwords in user store?
How do you use certificate authentication using X.509 certificates? What is the authentication scenario for intranet apps?
How do you support authentication for multiple clients? What is federated security?
How do you send credentials in the message when you are using transport security? How do you avoid clear-text passwords?

Authorization Q/A :-

How do you decide on an authorization strategy in WCF? How do you use Windows groups for role authorization in WCF?
How do you restrict access to WCF operations to specific Windows users? How do you associate roles with a certificate?
What is a service principal name (SPN)? How do you create a service principal name (SPN)?

Bindings Q/A :-

What is a binding? What bindings are available in WCF?
Which bindings are best suited for Internet? Which bindings are best suited for Intranet?
How do you choose an appropriate binding?

Configuration Management Q/A :-

How do you encrypt sensitive data in the WCF configuration file? How do you run a WCF service with a particular identity?
How do you create a service account for running my WCF service? When should I use a configuration file versus the WCF object model?
What is a metadata exchange (mex) binding? How do you keep clients from referencing my service?

Deployment Considerations Q/A :-

What are the additional considerations for using WCF in a Web farm? How do you configure Active Directory groups and accounts for roles-based authorization checks?
How do you create an X.509 certificate? When should you use a service principal name (SPN)?
How do I configure a least-privileged account for my service?

Exception Management Q/A :-

How do you implement a global exception handler? What is a fault contract?
How do you define a fault contract? How do you avoid sending exception details to the client?

Hosting Q/A :-

How do you configure a least-privileged account to host my service? When should I host my service in Internet Information Services (IIS)?
When should I host my service in a Windows service? When should I self-host my service?

Impersonation/Delegation Q/A :-

What are my impersonation options? What is the difference between impersonation and delegation?
How do you impersonate the original caller for an operation call? How do you temporarily impersonate the original caller in an operation call?
How do you impersonate a specific (fixed) identity? What is constrained delegation?
What is protocol transition? How do you flow the original caller from the ASP.NET client to a WCF service?
What is the difference between declarative and programmatic impersonation? What is the trusted sub-system model?
When should you flow the original caller to back-end code? How do you control access to a remote resource based on the original caller's identity?

Input/Data Validation Q/A :-

How do you implement input and data validation in WCF? What is schema validation?
What is parameter validation? Should you validate before or after message serialization?
How to protect your services from denial of service (DoS) attacks? How to protect your services from malicious input attacks?
How to protect your services from malformed messages?

Message Protection Q/A :-

When should you use message security? When should you use transport security?
How to protect your message when there are intermediaries routing the message? How to protect your message when there are multiple protocols used during message transit?

Proxy Considerations Q/A :-

When should you use a channel factory? When do you need to expose a metadata exchange (mex) endpoint for my service?
How do you avoid proxy spoofing?

Sensitive Data Q/A :-

How to protect your sensitive data in configuration files? How to protect your sensitive data in memory?
How to protect your metadata? How to protect your sensitive data from being read on the wire?
How to protect your sensitive data from being tampered with on the wire?

Certificates-X.509 Q/A :-

How do you create X.509 certificates? Do you need to create a certificate signed by the root CA certificate?
How do you use X.509 certificate revocation?

Additional Resources - https://msdn.microsoft.com/en-us/library/ff649839.aspx

I hope you are enjoying with this post! Please share with you friends. Thank you!!
By Anil Singh | Rating of this article (*****)

Popular posts from this blog

List of Countries, Nationalities and their Code In Excel File

Download JSON file for this List - Click on JSON file    Countries List, Nationalities and Code Excel ID Country Country Code Nationality Person 1 UNITED KINGDOM GB British a Briton 2 ARGENTINA AR Argentinian an Argentinian 3 AUSTRALIA AU Australian an Australian 4 BAHAMAS BS Bahamian a Bahamian 5 BELGIUM BE Belgian a Belgian 6 BRAZIL BR Brazilian a Brazilian 7 CANADA CA Canadian a Canadian 8 CHINA CN Chinese a Chinese 9 COLOMBIA CO Colombian a Colombian 10 CUBA CU Cuban a Cuban 11 DOMINICAN REPUBLIC DO Dominican a Dominican 12 ECUADOR EC Ecuadorean an Ecuadorean 13 EL SALVADOR

39 Best Object Oriented JavaScript Interview Questions and Answers

Most Popular 37 Key Questions for JavaScript Interviews. What is Object in JavaScript? What is the Prototype object in JavaScript and how it is used? What is "this"? What is its value? Explain why "self" is needed instead of "this". What is a Closure and why are they so useful to us? Explain how to write class methods vs. instance methods. Can you explain the difference between == and ===? Can you explain the difference between call and apply? Explain why Asynchronous code is important in JavaScript? Can you please tell me a story about JavaScript performance problems? Tell me your JavaScript Naming Convention? How do you define a class and its constructor? What is Hoisted in JavaScript? What is function overloadin

React | Encryption and Decryption Data/Text using CryptoJs

To encrypt and decrypt data, simply use encrypt () and decrypt () function from an instance of crypto-js. Node.js (Install) Requirements: 1.       Node.js 2.       npm (Node.js package manager) 3.       npm install crypto-js npm   install   crypto - js Usage - Step 1 - Import var   CryptoJS  =  require ( "crypto-js" ); Step 2 - Encrypt    // Encrypt    var   ciphertext  =  CryptoJS . AES . encrypt ( JSON . stringify ( data ),  'my-secret-key@123' ). toString (); Step 3 -Decrypt    // Decrypt    var   bytes  =  CryptoJS . AES . decrypt ( ciphertext ,  'my-secret-key@123' );    var   decryptedData  =  JSON . parse ( bytes . toString ( CryptoJS . enc . Utf8 )); As an Example,   import   React   from   'react' ; import   './App.css' ; //Including all libraries, for access to extra methods. var   CryptoJS  =  require ( "crypto-js" ); function   App () {    var   data

25 Best Vue.js 2 Interview Questions and Answers

What Is Vue.js? The Vue.js is a progressive JavaScript framework and used to building the interactive user interfaces and also it’s focused on the view layer only (front end). The Vue.js is easy to integrate with other libraries and others existing projects. Vue.js is very popular for Single Page Applications developments. The Vue.js is lighter, smaller in size and so faster. It also supports the MVVM ( Model-View-ViewModel ) pattern. The Vue.js is supporting to multiple Components and libraries like - ü   Tables and data grids ü   Notifications ü   Loader ü   Calendar ü   Display time, date and age ü   Progress Bar ü   Tooltip ü   Overlay ü   Icons ü   Menu ü   Charts ü   Map ü   Pdf viewer ü   And so on The Vue.js was developed by “ Evan You ”, an Ex Google software engineer. The latest version is Vue.js 2. The Vue.js 2 is very similar to Angular because Evan You was inspired by Angular and the Vue.js 2 components looks like -

Encryption and Decryption Data/Password in Angular

You can use crypto.js to encrypt data. We have used 'crypto-js'.   Follow the below steps, Steps 1 –  Install CryptoJS using below NPM commands in your project directory npm install crypto-js --save npm install @types/crypto-js –save After installing both above commands it looks like  – NPM Command  1 ->   npm install crypto-js --save NPM Command  2 ->   npm install @types/crypto-js --save Steps 2  - Add the script path in “ angular.json ” file. "scripts" : [                "../node_modules/crypto-js/crypto-js.js"               ] Steps 3 –  Create a service class “ EncrDecrService ” for  encrypts and decrypts get/set methods . Import “ CryptoJS ” in the service for using  encrypt and decrypt get/set methods . import  {  Injectable  }  from   '@angular/core' ; import   *   as   CryptoJS   from   'crypto-js' ; @ Injectable ({    providedIn:   'root' }) export   class   EncrDecrS