473,387 Members | 1,834 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

Security application block

AVL
Hi,
I want to use the Security application blcok in my application.

I installed the Enterprise library and read the documentation. but still
it's not very clear to me.

Can anyone suggest few sites where i can see practical examples of the
security block...it's urgent...............

Nov 19 '05 #1
2 3846
I had the same problem, but found a good articl
http://www.five-nine.co.uk/Enterpris...yTutorial.html

Hope this helps
Vibs

"AVL" wrote:
Hi,
I want to use the Security application blcok in my application.

I installed the Enterprise library and read the documentation. but still
it's not very clear to me.

Can anyone suggest few sites where i can see practical examples of the
security block...it's urgent...............

Nov 19 '05 #2
Hi,
I had a look at the sample appln built using security application
block. MSDN also has hands on labs on each of the application blocks...
http://www.microsoft.com/downloads/d...displaylang=en
But, can anybody suggest me as to whether 'authorization' using
security aplication block can be extended in such a way that I can
display the content based on the user, rather than allowing page level
authorization. Right now the security appln block shows us how to
assign roles to the users and depending on the role....display a page
or not. I haven't seen in it how to implement the functionality of
displaying different content to different users.
To be clear I have users and accounts to display and I have only one
role. So can I use the appln block and display only the accounts which
the users are assigned to.So User1 will see only Accounts A1, A2 and
User2 will view only Accounts A3, A4 etc...
Can anybody please get back to me? Its very urgent.
Thanks a lot.
Sam.

vibs wrote:
I had the same problem, but found a good article
http://www.five-nine.co.uk/Enterpris...yTutorial.html

Hope this helps
Vibs

"AVL" wrote:
Hi,
I want to use the Security application blcok in my application.

I installed the Enterprise library and read the documentation. but still
it's not very clear to me.

Can anyone suggest few sites where i can see practical examples of the
security block...it's urgent...............


Nov 19 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: Ant | last post by:
I am trying to apply security to a database I have just finished. The application is split into a back end of tables and a front end of forms etc. I need some users to have access to forms based on...
12
by: Z D | last post by:
Good Morning, I was looking for some feedback, guidance, input, comments, suggestions or just general thoughts on the following: For our internal development, I'm trying to create a general,...
16
by: Marina | last post by:
Hi, I am trying to find the minimum security settings to allow a windows control embedded in IE have full trust. If I give the entire Intranet zone full trust, this works. However, this is...
1
by: Kishore Gopalan | last post by:
The dependency 'MemoryMappedFileStream' could not be found. I get this message at compilation time...
1
by: Jason | last post by:
Hi I have a ASP.NET application where i would like to authenticate the connecting users according to the Local Users and Groups on the web server. I have the following code in the ASP.NET...
6
by: Jonathan Crawford | last post by:
Microsoft.Win32.RegistryKey.OpenSubKey(String name, Boolean writable) +473 Hi I have installed the enterprise library on a development machine and created a project on our webserver. When...
5
by: Ankit Aneja | last post by:
This is my problem. I am using Visual 2003, .Net framework 1.1 and the Application Block I configured the DAAB using the Enterprise Library Configuration now this is the error which is coming ...
7
by: nugget | last post by:
Role-based security for an ASP/ASP.NET mixed environment Hello: My co-worker and I have been charged with designing role-based security for our intranet. The technologies we have to work with...
3
by: michael sorens | last post by:
In the interests of increasing security, I came upon the DPAPI security library available from the GotDotNet user samples repository. What I want to do is create an applications that accesses a...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.