Click here to Skip to main content
15,886,362 members
Articles / Web Development / HTML
Article

Redirecting to custom 401 page when "Access denied" occures within an ASP.NET application with Windows authentication

Rate me:
Please Sign up or sign in to vote.
4.67/5 (17 votes)
3 Aug 20053 min read 353.2K   2.4K   45   31
This article answers a simple question: What to do when custom error page for error 401 in web.config is not working? How to replace the default ASP.NET "Access denied" page?

Introduction

If you have an ASP.NET application with authentication mode set to Windows:

XML
<authentication mode="Windows"/>
<authorization>
        <deny users="?" />
</authorization>

Then all Windows users can access your pages but those without Windows login (from internet) will receive an ASP.NET "Access Denied 401" page. I have decided to replace this default message with some custom page. After couple of hours Googling, I found out that this is a very common problem and all the workarounds which seem to be reasonable does not work. Here are some of them:

  1. Use a custom error page in Web.config:
    XML
    <customErrors defaultRedirect="ErrorPage.asp&shy;x" mode="On"> 
        <error statusCode="401" redirect="AccessDenied.aspx" />       
    </customErrors>

    This works fine with statusCode="404" but not with 401.

  2. Try to catch an unauthorized request in one of the application events in Global.asax.cs:
    C#
    protected void Application_AuthenticateRequest(Object sender, 
                                                        EventArgs e)
    {
     if (!Request.IsAuthenticated) Response.Redirect(
                                                "AccessDenied.aspx"); 
    }

    It is also useless, because even the browsers with valid credentials make two posts, one without credentials and having Request.IsAuthenticated=false and the other one with credentials and having Request.IsAuthenticated=true. Browsers without credentials make only one post. It means you are not able to determine if the first post having Request.IsAuthenticated=false comes from an unauthorized browser or not.

The problem

Then I found an answer from a Guru at microsoft.public.dotnet.framework.aspnet.security newsgroup.

That's correct. There's no way around that. The way wininet authentication works is that if the resource you are requesting does not allow anonymous access, a 401 is sent back to the browser. If the resource is using Windows Integrated authentication and the browser is configured to automatically send credentials, the token is sent back and the user is authenticated. In the case of Basic authentication, a login prompt is displayed and the user must log in.

If you intercept the 401 and redirect somewhere, you hijack the browser's ability to challenge. There is no way around that.

Jxx Cxxxxxx, MCSE, MCSD [MSFT], Developer Support, ASP.NET.

Resolution

That was also the result of my research. The whole thing works like this:

  1. The browser sends request without credentials to the server.
  2. Server rejects this request and answers with "401 Access Denied".
  3. Browser recognizes 401 and if it has appropriate credentials does not show this message. The second request with credentials will be posted. The requested page will be sent to the browser.
  4. If the browser has no credentials the second post will not take place. The received "401 Access Denied" will be shown.

The workaround is to manipulate the content of "401 Access Denied" response. The browser uses the header of this response to determine 401 case. It means we can manipulate the HTML content without influencing the whole challenge. For instance we can add the following code in the Application_EndRequest event of Global.asax.cs.

C#
protected void Application_EndRequest(Object sender,
                                           EventArgs e)
{
   HttpContext context = HttpContext.Current;
   if (context.Response.Status.Substring(0,3).Equals("401"))
   {
      context.Response.ClearContent();
      context.Response.Write("<script language="javascript">" +
                   "self.location='../login.aspx';</script>");
   }
}

Now, the whole thing works like this:

  1. The browser sends request without credentials to the server.
  2. Server rejects this request and answers with "401 Access Denied" Header + our JavaScript.
  3. Browser recognizes 401 and if it has appropriate credentials does not show this message. Our HTML will not be rendered and JavaScript will not be executed. The second request with credentials will be posted. The requested page will be sent to the browser.
  4. If the browser has no credentials, the second post will not take place. The received "401 Access Denied" will be shown. Our HTML will be rendered and JavaScript will be executed. The client side redirection will take place. The browser will show a custom 401 page.

Sample project

The sample project has only a few relevant lines of code in the Application_EndRequest event of Global.asax.cs. The page default.aspx is accessible only to authorized Windows users. If access is denied the page PublicArea/AccessDenied.aspx will be called. The folder PublicArea is according to local Web.config also accessible for anonymous users.

Attention: The IIS website must be configured to allow anonymous access.

License

This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below.

A list of licenses authors might use can be found here


Written By
Software Developer
Germany Germany
Tweeter: @gmamaladze
Google+: gmamaladze
Blog: gmamaladze.wordpress.com

Comments and Discussions

 
AnswerRe: login popup Pin
George Mamaladze3-Feb-06 5:50
George Mamaladze3-Feb-06 5:50 
GeneralRe: login popup Pin
golden child16-Oct-06 10:54
golden child16-Oct-06 10:54 
AnswerRe: login popup Pin
Member 1190713723-Sep-16 23:18
Member 1190713723-Sep-16 23:18 
GeneralReally Good One... Pin
prapro17-Oct-05 2:43
prapro17-Oct-05 2:43 
GeneralServer-side redirect Pin
Leonid Fofanov16-Aug-05 7:49
Leonid Fofanov16-Aug-05 7:49 
GeneralRe: Server-side redirect Pin
George Mamaladze16-Aug-05 8:40
George Mamaladze16-Aug-05 8:40 
GeneralThanks for the effort Pin
eleung10-Aug-05 9:55
eleung10-Aug-05 9:55 
GeneralRe: Thanks for the effort Pin
George Mamaladze10-Aug-05 12:20
George Mamaladze10-Aug-05 12:20 
You are right. Thre are in fact two stages of Authentication. If you switch off Anonimous access in IIS you will be rejected at IIS stage and have no chanse to see any ASPX page in this Web Application. If you let IIS accept Anonymous you can still allow or deny unauthenticated access in parts of your application by creating individual Web.config-s for dithered directories (<allow users="?"> entry).

Your solution assumes prohibiting access on IIS level (401-1.htm will work only in this case, otherwise comes ASP.NET 401 page. These are two different things). And it means that you can not create Web Applications with mixed access.

Your solution is good when thwo separate Web Applications can be created. One with Annonymous access anothor without. In this case users rejected in one Web Application will land in another one.

My solution is designed to allow fallback from protected area into public one within one ASP.NET Web Application without receiving 401-1 screen. Big Grin | :-D
GeneralRe: Thanks for the effort Pin
Anonymous24-Aug-05 20:41
Anonymous24-Aug-05 20:41 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.