473,608 Members | 2,479 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Security application block

AVL
Hi,
I want to use the Security application blcok in my application.

I installed the Enterprise library and read the documentation. but still
it's not very clear to me.

Can anyone suggest few sites where i can see practical examples of the
security block...it's urgent......... ......

Nov 19 '05 #1
2 3860
I had the same problem, but found a good articl
http://www.five-nine.co.uk/Enterpris...yTutorial.html

Hope this helps
Vibs

"AVL" wrote:
Hi,
I want to use the Security application blcok in my application.

I installed the Enterprise library and read the documentation. but still
it's not very clear to me.

Can anyone suggest few sites where i can see practical examples of the
security block...it's urgent......... ......

Nov 19 '05 #2
Hi,
I had a look at the sample appln built using security application
block. MSDN also has hands on labs on each of the application blocks...
http://www.microsoft.com/downloads/d...displaylang=en
But, can anybody suggest me as to whether 'authorization' using
security aplication block can be extended in such a way that I can
display the content based on the user, rather than allowing page level
authorization. Right now the security appln block shows us how to
assign roles to the users and depending on the role....display a page
or not. I haven't seen in it how to implement the functionality of
displaying different content to different users.
To be clear I have users and accounts to display and I have only one
role. So can I use the appln block and display only the accounts which
the users are assigned to.So User1 will see only Accounts A1, A2 and
User2 will view only Accounts A3, A4 etc...
Can anybody please get back to me? Its very urgent.
Thanks a lot.
Sam.

vibs wrote:
I had the same problem, but found a good article
http://www.five-nine.co.uk/Enterpris...yTutorial.html

Hope this helps
Vibs

"AVL" wrote:
Hi,
I want to use the Security application blcok in my application.

I installed the Enterprise library and read the documentation. but still
it's not very clear to me.

Can anyone suggest few sites where i can see practical examples of the
security block...it's urgent......... ......


Nov 19 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
1725
by: Ant | last post by:
I am trying to apply security to a database I have just finished. The application is split into a back end of tables and a front end of forms etc. I need some users to have access to forms based on some queries but not others. My question is do I run the security wizard in the back end DB or the front end? If I just do the front end I seem to have more control (Queries, individual forms etc) but what’s to stop some one just opening the...
12
2214
by: Z D | last post by:
Good Morning, I was looking for some feedback, guidance, input, comments, suggestions or just general thoughts on the following: For our internal development, I'm trying to create a general, reusable security framework that is very flexible. It would have to handle both Authentication and Authorization. The access levels allowed on each 'object' would be: View/Edit/Read/Write.
16
2096
by: Marina | last post by:
Hi, I am trying to find the minimum security settings to allow a windows control embedded in IE have full trust. If I give the entire Intranet zone full trust, this works. However, this is very broad and gives the entire zone high privleges. I tried giving just the assembly full trust (using the full URL for the DLL), but this doesn't seem to work.
1
1246
by: Kishore Gopalan | last post by:
The dependency 'MemoryMappedFileStream' could not be found. I get this message at compilation time...
1
2652
by: Jason | last post by:
Hi I have a ASP.NET application where i would like to authenticate the connecting users according to the Local Users and Groups on the web server. I have the following code in the ASP.NET project. private static void Demand(string groups) { WindowsIdentity processIdentity = WindowsIdentity.GetCurrent(); Console.WriteLine(processIdentity.Name);
6
1937
by: Jonathan Crawford | last post by:
Microsoft.Win32.RegistryKey.OpenSubKey(String name, Boolean writable) +473 Hi I have installed the enterprise library on a development machine and created a project on our webserver. When I run a simple data access page I get an error message. Apparently
5
9766
by: Ankit Aneja | last post by:
This is my problem. I am using Visual 2003, .Net framework 1.1 and the Application Block I configured the DAAB using the Enterprise Library Configuration now this is the error which is coming Security Exception Description: The application attempted to perform an operation not allowed
7
2997
by: nugget | last post by:
Role-based security for an ASP/ASP.NET mixed environment Hello: My co-worker and I have been charged with designing role-based security for our intranet. The technologies we have to work with are ASP and ASP.NET. This security design must support *both* technologies. Currently, we have a successful collection of both ASP and ASP.NET applications with an identical look and feel; you'd only know they are different by virtue of an ASP...
3
3797
by: michael sorens | last post by:
In the interests of increasing security, I came upon the DPAPI security library available from the GotDotNet user samples repository. What I want to do is create an applications that accesses a database with one single password embedded in the program, so it may be run by any user on any machine. I observe that one may specify a UserStore or a MachineStore for constraining the encryption. That seems to imply that my application would only...
0
8495
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
8470
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
6815
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6011
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5475
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
3960
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4023
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2474
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
0
1328
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.