Explain role-based security?
Answers were Sorted based on User's Feedback
Answer / swapna
In the role-based security model, access to parts of an
application are granted or denied based on the role to
which the callers belong.
A role defines which members of a Windows domain are
allowed to work with what components, methods, or interfaces
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / sushil kumar
Role Based Security lets you identify groups of users to allow or deny based on their role in the organization.In Windows NT and Windows XP, roles map to names used to identify user groups. Windows defines several built-in groups, including Administrators, Users, and Guests.To allow or deny access to certain groups of users, add the <ROLES>element to the authorization list in your Web application's Web.config file.e.g.
<AUTHORIZATION>< authorization >
< allow roles="Domain NameAdministrators" / > < !-- Allow Administrators in domain. -- >
< deny users="*" / > < !-- Deny anyone else. -- >
< /authorization >
| Is This Answer Correct ? | 0 Yes | 0 No |
What is the new three features of COM+ services, which are not there in COM (MTS) ?
Explain loosely coupled events?
Is com+ dead?
What is ccw?
What is Pinvoke?
What are loosely coupled events?
Explain disadvantages of com components?
What is use of ContextUtil class?
Explain what are wrapper classes?
Explain the disadvantages of com components?
Define availability?
How does you handle this COM components developed in other programming languages in .NET?
Visual Basic (800)
C Sharp (3816)
ASP.NET (3180)
VB.NET (461)
COM+ (79)
ADO.NET (717)
IIS (369)
MTS (11)
Crystal Reports (81)
BizTalk (89)
Dot Net (2435)
Exchange Server (362)
SharePoint (720)
WCF (340)
MS Office Microsoft (6963)
LINQ Language-Integrated Query (317)
WPF (371)
TypeScript (144)
Microsoft Related AllOther (311)