Implementing a reliable device identification method in ASP.NET

The Developer’s Guide to Tracking Users in ASP.NET: Obtaining Device or Machine-Fixed Unique IDs

Edwin Klesman
7 min readApr 21

--

In this article, you will learn about three methods — alongside with the necessary code — for obtaining a device or machine-fixed unique ID in an ASP.NET web application and discuss which method is the easiest to spoof, and most trustworthy. #dotnet #csharp #aspdotnet #microsoft

In some cases, it’s useful to have a way to uniquely identify a device or machine that is accessing your ASP.NET web application. This can be used for various purposes, such as tracking user activity or preventing fraudulent access.

In this article, we’ll explore three methods for obtaining a device or machine-fixed unique ID in an ASP.NET web application and discuss which method is the easiest to spoof, and most trustworthy.

3 Methods to Track Unique ID’s Of A Device Or Machine

Obtaining a device or machine-fixed unique ID can be useful in certain scenarios, but it’s important to consider the privacy and security implications of collecting and storing such IDs. The three methods that are described in this article each have their own advantages and disadvantages, so you should choose the method that best suits your specific use case.

The Legal Side

It’s important to note that privacy laws and regulations can vary widely depending on the country or region in question. Therefore, it’s important to check your local regulations and/or consult with legal counsel and stay informed of any relevant laws and regulations before implementing any tracking or identification methods in your ASP.NET web application. Additionally, it’s important to be transparent with users about what information you are collecting and how you plan to use it.

Furthermore, it’s worth noting that the accuracy and reliability of each method can vary depending on factors such as network topology, user behaviour, and device settings. It’s a good idea to test each method thoroughly in your specific environment before relying on it in a production application.

Method 1: Using the MAC address of the device

The MAC address is a unique identifier assigned to the network interface of a device. The MAC (Media Access Control) address, sometimes referred to as a hardware or physical address, is a unique, 12-character alphanumeric…

--

--

Edwin Klesman

Team lead @Detacom | cross-platform | mobile & web dev | Product Development | SaaS | your guide from app ideas to realization | Owner www.eekayonline.com

Recommended from Medium

Lists

See more recommendations