Explain role-based security?
Answers were Sorted based on User's Feedback
Answer / swapna
In the role-based security model, access to parts of an
application are granted or denied based on the role to
which the callers belong.
A role defines which members of a Windows domain are
allowed to work with what components, methods, or interfaces
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / sushil kumar
Role Based Security lets you identify groups of users to allow or deny based on their role in the organization.In Windows NT and Windows XP, roles map to names used to identify user groups. Windows defines several built-in groups, including Administrators, Users, and Guests.To allow or deny access to certain groups of users, add the <ROLES>element to the authorization list in your Web application's Web.config file.e.g.
<AUTHORIZATION>< authorization >
< allow roles="Domain NameAdministrators" / > < !-- Allow Administrators in domain. -- >
< deny users="*" / > < !-- Deny anyone else. -- >
< /authorization >
| Is This Answer Correct ? | 0 Yes | 0 No |
Disadvantages of com components?
Is the COM architecture same as .Net architecture? What is the difference between them?
Define jit activation?
Disadvantages of COM components?
Explain consistency?
Why we learn the 8085? Because we are in 21 century so why we learn 8085?
Explain how to make a net component talk to a com component?
Is it true that COM objects no longer need to be registered on the server?
What is COM?
Explain role-based security?
What is availability?
Explain JIT activation?
Visual Basic (800)
C Sharp (3816)
ASP.NET (3180)
VB.NET (461)
COM+ (79)
ADO.NET (717)
IIS (369)
MTS (11)
Crystal Reports (81)
BizTalk (89)
Dot Net (2435)
Exchange Server (362)
SharePoint (720)
WCF (340)
MS Office Microsoft (6963)
LINQ Language-Integrated Query (317)
WPF (371)
TypeScript (144)
Microsoft Related AllOther (311)