473,396 Members | 1,892 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

need granular security

hey all,
i'm creating an intranet application and i need very granular security down
to the user what's the best way to accomplish this? For instance, a user
accesses the site and can only see certain links or records available to that
user.

thanks,
rodchar
Apr 27 '07 #1
3 1318
Use Forms Authentication with Roles.
You can start with the default Membership and Roles providers.
Peter

--
Site: http://www.eggheadcafe.com
UnBlog: http://petesbloggerama.blogspot.com
Short urls & more: http://ittyurl.net


"rodchar" wrote:
hey all,
i'm creating an intranet application and i need very granular security down
to the user what's the best way to accomplish this? For instance, a user
accesses the site and can only see certain links or records available to that
user.

thanks,
rodchar
Apr 27 '07 #2
In that case, how will access to the database be setup thru the data access
layer? what user/role should perform the functions to update the database?
"Peter Bromberg [C# MVP]" wrote:
Use Forms Authentication with Roles.
You can start with the default Membership and Roles providers.
Peter

--
Site: http://www.eggheadcafe.com
UnBlog: http://petesbloggerama.blogspot.com
Short urls & more: http://ittyurl.net


"rodchar" wrote:
hey all,
i'm creating an intranet application and i need very granular security down
to the user what's the best way to accomplish this? For instance, a user
accesses the site and can only see certain links or records available to that
user.

thanks,
rodchar
May 3 '07 #3
I'm not following you. Access to your database happens through a connection
string in your web.config. It could be the same one that's used by the
Membership / Roles/ profiles providers, or it might not.
Peter
--
Site: http://www.eggheadcafe.com
UnBlog: http://petesbloggerama.blogspot.com
Short urls & more: http://ittyurl.net


"rodchar" wrote:
In that case, how will access to the database be setup thru the data access
layer? what user/role should perform the functions to update the database?
"Peter Bromberg [C# MVP]" wrote:
Use Forms Authentication with Roles.
You can start with the default Membership and Roles providers.
Peter

--
Site: http://www.eggheadcafe.com
UnBlog: http://petesbloggerama.blogspot.com
Short urls & more: http://ittyurl.net


"rodchar" wrote:
hey all,
i'm creating an intranet application and i need very granular security down
to the user what's the best way to accomplish this? For instance, a user
accesses the site and can only see certain links or records available to that
user.
>
thanks,
rodchar
May 3 '07 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: Ken Varn | last post by:
I have a named mutex object that is accessed by both an asp.net application and a Windows executable .net application. The Windows executable runs under the administrator logon, while the asp.net...
5
by: Rob R. Ainscough | last post by:
This is more of a conceptual question: 1. More and more companies are using VPN's and locking out internet connectivity (for a host of reasons, security, productivity, etc.). 2. ASP.NET...
3
by: Jeffrey | last post by:
Good day all, I have seen so many postings dealing with MS Access as a security risk and other items, yet I see now clear reason why. I would really like someone to point me in the right...
7
by: Timothy Shih | last post by:
Hi, I am trying to figure out how to use unmanaged code using P/Invoke. I wrote a simple function which takes in 2 buffers (one a byte buffer, one a char buffer) and copies the contents of the byte...
10
by: Jayme Pechan | last post by:
I wrote a very simply web application and I'm having all sorts of problems with the security getting in the way. All the web application does is load an out-of-process COM server that is running...
8
by: Sai Kit Tong | last post by:
In the article, the description for "Modiy DLL That Contains Consumers That Use Managed Code and DLL Exports or Managed Entry Points" suggests the creation of the class ManagedWrapper. If I...
2
by: Larry David | last post by:
Hi, This is one of those posts where not only do I not know the answer, I don't fully understand the *question* that I should be asking... but I'll try my best: I've designed a web site which...
0
by: Chris | last post by:
Ok I have made an .net active x control if you want to view it http://mapguide.alignex.com/test/axtest2.html Site needs to be fully trusted.. So i will understand if you dont want to view it. ...
92
by: Ray | last post by:
I just moved to another company that's mainly a Java/.NET shop. I was happy to find out that there's a movement from the grassroot to try to convince the boss to use a dynamic language for our...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.