search
HomeDatabaseMysql Tutorial如何让您的ASP.NET数据库连接字符串是安全的

今天午餐时候,我与 Rob Conery研究将This Developer's Life播客网站移动到 Git中。我们录制了整个升级和迁移经历,它很快会作为一个视频上传到TekPub上。 植入:在TekPub.tv上签出 我的 TekPub 秀源代码 。 在部署时出现了一个问题。我们将我们的数据库从SQ

今天午餐时候,我与 Rob Conery研究将This Developer's Life播客网站移动到 Git中。我们录制了整个升级和迁移经历,它很快会作为一个视频上传到TekPub上。

         植入:在TekPub.tv上签出。

在部署时出现了一个问题。我们将我们的从SQL Compact移动到了 Azure 中的 SQL Server 实例。但是,我们如何让我们的连接字符串是秘密的呢?我们将我们的源代码推送到 GitHub上,但不想公开我们的连接字符串和密码。

有时,你会制作一个 Web.Release.Config 文件,然后把它们放在那儿。有时你会制作一个 connectionStrings.config ,然后从 web.config 中引用它,但永远不会部署它。

然而,Azure 允许您将这些配置设置安全地保存在 Azure 中,所以它们永远不会以代码形式显示。请注意下面的屏幕截图。有一个名为"TDL."的连接字符串,它与我们在代码中所引用的名称和web.config 中连接字符串的名称是相匹配的。

如何让您的ASP.NET数据库连接字符串是安全的

我们的 ASP.NET Web Pages数据库调用是针对 WebMatrix.Data 中的 Database.Open。这是相当简单的。

var db = Database.Open("TDL");

这用于引用一个 TDL.sdf SQL Server Compact Edition (SQL CE) 文件。然后我们将它移到一个连接字符串中。

<connectionstrings><br>  <add name="TDL" connectionstring="blah blah" providername="yada yada"></add><br></connectionstrings>

如果您的 Azure 配置(请看上面的截图)拥有一个具有相同名称的值,当部署您的应用程序时,来自Azure 的安全值将被替换。

陷阱警告:我花了二十分钟试图找出为什么我的值没有得到更新。我的应用程序在操作时,好像根本就没有任何连接字符串值。我获得信息"找不到连接字符串"TDL""。多次气得咬牙切齿之后,我发现(多亏David Ebbo的帮助) 我把 元素放在web.config内的中了,而错误被吞没了。显然那一部分对元素是相当宽松的,它不理解- system.web部分当然更宽松了。无论如何,希望它可以节约一些访客 (也许是您!) 的时间,请确保您的 connectionStrings 元素位于

所有的一切,都运作得很好。

如何让您的ASP.NET数据库连接字符串是安全的

它让我们把代码放在 GitHub上,设置直接从 GitHub中自动部署到 Azure,同时仍让我们的 SQL 连接字符串 (和任何其他的产品设置) 是私密的。

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How to Grant Permissions to New MySQL UsersHow to Grant Permissions to New MySQL UsersMay 09, 2025 am 12:16 AM

TograntpermissionstonewMySQLusers,followthesesteps:1)AccessMySQLasauserwithsufficientprivileges,2)CreateanewuserwiththeCREATEUSERcommand,3)UsetheGRANTcommandtospecifypermissionslikeSELECT,INSERT,UPDATE,orALLPRIVILEGESonspecificdatabasesortables,and4)

How to Add Users in MySQL: A Step-by-Step GuideHow to Add Users in MySQL: A Step-by-Step GuideMay 09, 2025 am 12:14 AM

ToaddusersinMySQLeffectivelyandsecurely,followthesesteps:1)UsetheCREATEUSERstatementtoaddanewuser,specifyingthehostandastrongpassword.2)GrantnecessaryprivilegesusingtheGRANTstatement,adheringtotheprincipleofleastprivilege.3)Implementsecuritymeasuresl

MySQL: Adding a new user with complex permissionsMySQL: Adding a new user with complex permissionsMay 09, 2025 am 12:09 AM

ToaddanewuserwithcomplexpermissionsinMySQL,followthesesteps:1)CreatetheuserwithCREATEUSER'newuser'@'localhost'IDENTIFIEDBY'password';.2)Grantreadaccesstoalltablesin'mydatabase'withGRANTSELECTONmydatabase.TO'newuser'@'localhost';.3)Grantwriteaccessto'

MySQL: String Data Types and CollationsMySQL: String Data Types and CollationsMay 09, 2025 am 12:08 AM

The string data types in MySQL include CHAR, VARCHAR, BINARY, VARBINARY, BLOB, and TEXT. The collations determine the comparison and sorting of strings. 1.CHAR is suitable for fixed-length strings, VARCHAR is suitable for variable-length strings. 2.BINARY and VARBINARY are used for binary data, and BLOB and TEXT are used for large object data. 3. Sorting rules such as utf8mb4_unicode_ci ignores upper and lower case and is suitable for user names; utf8mb4_bin is case sensitive and is suitable for fields that require precise comparison.

MySQL: What length should I use for VARCHARs?MySQL: What length should I use for VARCHARs?May 09, 2025 am 12:06 AM

The best MySQLVARCHAR column length selection should be based on data analysis, consider future growth, evaluate performance impacts, and character set requirements. 1) Analyze the data to determine typical lengths; 2) Reserve future expansion space; 3) Pay attention to the impact of large lengths on performance; 4) Consider the impact of character sets on storage. Through these steps, the efficiency and scalability of the database can be optimized.

MySQL BLOB : are there any limits?MySQL BLOB : are there any limits?May 08, 2025 am 12:22 AM

MySQLBLOBshavelimits:TINYBLOB(255bytes),BLOB(65,535bytes),MEDIUMBLOB(16,777,215bytes),andLONGBLOB(4,294,967,295bytes).TouseBLOBseffectively:1)ConsiderperformanceimpactsandstorelargeBLOBsexternally;2)Managebackupsandreplicationcarefully;3)Usepathsinst

MySQL : What are the best tools to automate users creation?MySQL : What are the best tools to automate users creation?May 08, 2025 am 12:22 AM

The best tools and technologies for automating the creation of users in MySQL include: 1. MySQLWorkbench, suitable for small to medium-sized environments, easy to use but high resource consumption; 2. Ansible, suitable for multi-server environments, simple but steep learning curve; 3. Custom Python scripts, flexible but need to ensure script security; 4. Puppet and Chef, suitable for large-scale environments, complex but scalable. Scale, learning curve and integration needs should be considered when choosing.

MySQL: Can I search inside a blob?MySQL: Can I search inside a blob?May 08, 2025 am 12:20 AM

Yes,youcansearchinsideaBLOBinMySQLusingspecifictechniques.1)ConverttheBLOBtoaUTF-8stringwithCONVERTfunctionandsearchusingLIKE.2)ForcompressedBLOBs,useUNCOMPRESSbeforeconversion.3)Considerperformanceimpactsanddataencoding.4)Forcomplexdata,externalproc

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.