Connecting securely to Database and Application from remote computer.

Discussion in 'Windows / IIS' started by jimmy, Nov 18, 2011.

  1. Hi,

    Just wondering, how to I connect securely to the hosted applications and databases from my computer?

    1. I can use Web Deploy in Visual Studio 2010, and it uses "https" for transfer, so I suppose that is secure. Am I right?

    2. Then what about connecting to my application from IIS manager? Does that also use https?

    3. How about connecting to my database from SQL Server?

    Thanks.

    James
     
  2. RayH

    RayH DiscountASP.NET Lackey DiscountASP.NET Staff

    Hi James,

    1. I can use Web Deploy in Visual Studio 2010, and it uses "https" for transfer, so I suppose that is secure. Am I right?

    Yes. Web Deploy uses HTTPS for transfer.

    2. Then what about connecting to my application from IIS manager? Does that also use https?

    I'm not sure if IIS7 Manager uses HTTPS, but I wouldn't be overly worried about it.

    3. How about connecting to my database from SQL Server?

    If you're trying to connect to your database using SQL Server Management Studio, you can click on Options and check Encrypt connection.
     
  3. Hi Tasslehoff,

    Thanks for the quick reply. I've read around and came to the same conclusion about the other 2 questions. But, can you explain your rational about what you said here?

    Wouldn't it pose a security threat if it's not secured/encrypted?

    It seems to say that it does support HTTPS here
    http://www.iis.net/download/iismanager, but I'll keep on looking until I have better confirmation. I'm not sure if the HTTPS connection is by default.

    Thanks,

    James
     
  4. RayH

    RayH DiscountASP.NET Lackey DiscountASP.NET Staff

    Hi James,

    All I really meant is that I couldn't confirm if IIS7 Manager uses HTTPS, but I'm fairly certain that Microsoft wouldn't allow your authentication credentials to be transmitted over the Internet via clear text. Even then, someone needs to by chance be capturing network packets along the network route that your packets traverse, and then analyze and decrypt the information being sent.
     
  5. Wendell2012

    Wendell2012 Guest

    Thanks for the quick reply.[​IMG][​IMG]
     

Share This Page