User Guide

Table Of Contents
373
CHAPTER 16
Securing Applications
This chapter provides an overview of Macromedia ColdFusion security features, including brief
descriptions of several ColdFusion security features and references to additional documentation
not included in this chapter.
This chapter includes a summary of resource security (ColdFusion MX Standard) or sandbox
security (ColdFusion MX Enterprise), where security restricts access to specific resources, such as
tags and files. The information describes how you use the ColdFusion MX Administrator to
configure sandbox or resource security, and discusses structuring an application to take advantage
of this security.
This chapter also includes detailed description of user security, which depends on a user identity. It
explains in detail how to implement user security in ColdFusion applications.
Other chapters discuss specific security issues as part of the context of their topics. For links to
some of the more significant security features, see the cross references in “ColdFusion security
features” on page 374. Also see the security entries in the Index. For detailed information on
using Administrator-controlled security features, see Configuring and Administering
ColdFusion MX.
This chapter does not discuss general security issues or web server security concepts and issues in
any detail. For example, it does not discuss web server security management issues, such as
enabling HTTPS protocol support. For information on enabling web server security features, see
your web server documentation. Many books and other resources are available on web and
application security.
Contents
ColdFusion security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
About resource and sandbox security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
About user security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Using ColdFusion security tags and functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Security scenarios. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Implementing user security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388