Explain role-based security?
Answers were Sorted based on User's Feedback
Answer / swapna
In the role-based security model, access to parts of an
application are granted or denied based on the role to
which the callers belong.
A role defines which members of a Windows domain are
allowed to work with what components, methods, or interfaces
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / sushil kumar
Role Based Security lets you identify groups of users to allow or deny based on their role in the organization.In Windows NT and Windows XP, roles map to names used to identify user groups. Windows defines several built-in groups, including Administrators, Users, and Guests.To allow or deny access to certain groups of users, add the <ROLES>element to the authorization list in your Web application's Web.config file.e.g.
<AUTHORIZATION>< authorization >
< allow roles="Domain NameAdministrators" / > < !-- Allow Administrators in domain. -- >
< deny users="*" / > < !-- Deny anyone else. -- >
< /authorization >
Is This Answer Correct ? | 0 Yes | 0 No |
How to register com+ services?
What is com, com+ and dcom ?
What is security?
Explain the disadvantages of com components?
What is integrity?
Disadvantages of com components?
Is it true that COM objects no longer need to be registered on the server?
What are Interop Services?
Define scalability?
Define manageability?
How will you register com+ services?
What is durability?