473,809 Members | 2,742 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

inherited security strategy needed

I'm building an application that uses a folder and object heirarchy
metaphor. I would like to be able to set access rights generically (at the
folder) or specifically (for the object) for groups or individuals. I would
also like to be able to 'inherit' rights from parent folders to child
folders.

Has anyone seen any examples of how this might be done or suggest an
approach?

Thanks,

Craig Buchanan
Nov 18 '05 #1
1 1022
In our case, we wanted to restrict users based upon access to functionality,
which meant, in our case, User Controls. That is, we have pages which load
different User Controls depending upon what functionality is desired. So we
created a class (called "PageConten t") which inherits
System.Web.UI.U serControl and added code in its' Init handler that checks
the current user against a Collection of Groups that we derive from our
database. We have a Users table and a Groups table, and a
"PageContentGro ups" table, which links Users to Groups based upon the
PageContent class being employed. When the PageContent class initializes, it
loads a collection of Group which are authorized to view that PageContent
class. An anonymous user defaults to a User object that has no Groups.
Otherwise, the user logs in via a form, and the User object for that User is
stored in Session. The User class also has a collection of Groups which that
user belongs to, and this is what is compared to the Groups collection in
the PageContent class.

This way, the whole Security issue is handled without the developer having
to think about it, in the base class for the User Control (PageContent
class) being developed. To change security for a PageContent class, we just
manipulate the database.

This could be done at Page level as well.

--
HTH,
Kevin Spencer
..Net Developer
Microsoft MVP
Big things are made up
of lots of little things.

"Craig Buchanan" <so*****@somewh ere.com> wrote in message
news:#1******** ******@tk2msftn gp13.phx.gbl...
I'm building an application that uses a folder and object heirarchy
metaphor. I would like to be able to set access rights generically (at the folder) or specifically (for the object) for groups or individuals. I would also like to be able to 'inherit' rights from parent folders to child
folders.

Has anyone seen any examples of how this might be done or suggest an
approach?

Thanks,

Craig Buchanan

Nov 18 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
3030
by: Steve Jorgensen | last post by:
I'm restarting this thread with a different focus. The project I'm working on now id coming along and will be made to work, and it's too late to start over with a new strategy. Still, I'm not coming to a firm conclusion over whether it was the better approach, and wonder if I should do it differently the next time I'm faced with a similar issue. I needed an app to automatically import from spreadsheets with a semi-dynamic structure,...
3
1569
by: Deano | last post by:
i.e the best way to have multiple validated users on the system who can then access the back-end? Or is it just as easy to write your own user management and login form and base your code on that? --
4
2489
by: BrianS | last post by:
What is the best strategy for dynamic loading private assemblies in asp.net? I understand, and have confirmed, that any dll placed in the app's /bin dir will get loaded on startup. This is not desirable. I have a web service that, based on an input parameter, dynamically loads A, B or C library. I also understand that an separate AppDomain is needed to explicitly unload the Assembly. No other apps will use these assemblies. Do I need...
0
1025
by: honcho | last post by:
My ASP.NET web application has a flaw that produces false security-violation alarms. There are several categories of users for this web site, e.g. Colonels, Sergeants, Private_1s, and Private_2s. Colonels may visit any page in the web site. Sergeants may visit only non-com pages. The non-com pages consist of non-com-0, non-com-1, and non-com-2 pages. Private_1s may visit non-com-0 and non-com-1 pages. Private_2s may visit...
1
877
by: Craig Buchanan | last post by:
I'm building an application that uses a folder and object heirarchy metaphor. I would like to be able to set access rights generically (at the folder) or specifically (for the object) for groups or individuals. I would also like to be able to 'inherit' rights from parent folders to child folders. Has anyone seen any examples of how this might be done or suggest an approach? Thanks,
3
5484
by: Wayne Brantley | last post by:
VS2005 RTM Create a web user control to use as a base class for other web user controls. Now, create a new web user control, change the class it inherits from to your base class and compile. (You must have a <% Register %> so it will see it) You will get TWO warnings per class like:
0
907
by: KevinMac | last post by:
I'm investigating requirements for deploying applications created for ..NET 2.0 (I've been working with VS2005, C#). One concern I have is granting client PCs code security rights. I know how to use the ".NET 2.0 Configuration Manager" to grant access for a particular, local, single machine. Research suggests that this also possible via group policy and msi's distributed via SMS; however, there appears to be caveats with this...
7
1820
by: Ryan | last post by:
I have a bit of a problem with regards an indexing strategy. Well, basically there is no indexing strategy on a set of data I have at work. Now, I didn't create the design as I would have allowed for this. OK, so there is primary key (clustered) indexes (mainly composite keys), but no other indexes on the tables. As you would expect, the performance leaves a lot to be desired. A hell of a lot. We have several million rows in a lot of the...
25
3415
by: marcin.rzeznicki | last post by:
Hello everyone I've got a little problem with choosing the best decoding strategy for some nasty problem. I have to deal with very large files wich contain text encoded with various encodings. Their length makes loading contents of file into memory in single run inappropriate. I solved this problem by implementing memory mapping using P/Invoke and I load contents of file in chunks. Since files' contents are in different encodings what I...
0
9721
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10376
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10379
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10115
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
7660
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6881
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5550
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5687
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
3861
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.