Explain role-based security?
Answers were Sorted based on User's Feedback
Answer / swapna
In the role-based security model, access to parts of an
application are granted or denied based on the role to
which the callers belong.
A role defines which members of a Windows domain are
allowed to work with what components, methods, or interfaces
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / sushil kumar
Role Based Security lets you identify groups of users to allow or deny based on their role in the organization.In Windows NT and Windows XP, roles map to names used to identify user groups. Windows defines several built-in groups, including Administrators, Users, and Guests.To allow or deny access to certain groups of users, add the <ROLES>element to the authorization list in your Web application's Web.config file.e.g.
<AUTHORIZATION>< authorization >
< allow roles="Domain NameAdministrators" / > < !-- Allow Administrators in domain. -- >
< deny users="*" / > < !-- Deny anyone else. -- >
< /authorization >
| Is This Answer Correct ? | 0 Yes | 0 No |
What is integrity?
WHY WE LEARN THE 8085 ? BECAUSE WE R IN 21 CENTURI SO WHY WE LEARN 8085?
What are rcw?
How does you handle this COM components developed in other programming languages in .NET?
Explain object pooling?
How CCW and RCW is working?
Disadvantages of COM components?
Explain integrity ?
Explain the disadvantages of com components?
Difference between .NET components and COM components?
how to register dll in COM / COM+ application
Is the COM architecture same as .Net architecture? What is the difference between them?
Visual Basic (800)
C Sharp (3816)
ASP.NET (3180)
VB.NET (461)
COM+ (79)
ADO.NET (717)
IIS (369)
MTS (11)
Crystal Reports (81)
BizTalk (89)
Dot Net (2435)
Exchange Server (362)
SharePoint (720)
WCF (340)
MS Office Microsoft (6963)
LINQ Language-Integrated Query (317)
WPF (371)
TypeScript (144)
Microsoft Related AllOther (311)