Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Explain role-based security?

Answer Posted / sushil kumar

Role Based Security lets you identify groups of users to allow or deny based on their role in the organization.In Windows NT and Windows XP, roles map to names used to identify user groups. Windows defines several built-in groups, including Administrators, Users, and Guests.To allow or deny access to certain groups of users, add the <ROLES>element to the authorization list in your Web application's Web.config file.e.g.
<AUTHORIZATION>< authorization >
< allow roles="Domain NameAdministrators" / > < !-- Allow Administrators in domain. -- >
< deny users="*" / > < !-- Deny anyone else. -- >
< /authorization >

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is scalability?

866


Explain the disadvantages of com components?

3129


What is reliability?

890


Define jit activation?

3565


How to register com+ services?

875


What is availability?

3628


What happens when we instantiate a .NET component ?

4485


Is the com architecture same as .net architecture?

3466


What is transaction atomicity?

873


Is com+ dead?

863


Explain disadvantages of com components?

879


What is manageability?

922


how to register dll in COM / COM+ application

7609


Explain what are wrapper classes?

886


What are loosely coupled events?

3233