O'Reilly logo

Developer's Guide to Microsoft® Enterprise Library, Visual Basic® Edition by Fernando Simonazzi, Bob Brumfield, Grigori Melnik, Nicolas Botto, Chris Tavares, Erik Renaud, Alex Homer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. An Authentic Approach to Token Identity

Introduction

I guess most people have seen a sitcom on TV where some unfortunate member of the cast is faced with a large red button carrying a sign that says “Do not press this button.” You know that, after the requisite amount of facial contortions and farcical fretting, they are going to press the button and some comedic event will occur. So it’s reasonably certain that any user authorization strategy you adopt that contains an element that simply asks the user not to press that button unless he is a manager or administrator is not likely to provide a secure environment for your enterprise application.

User authorization—controlling what your users can and cannot do with your application—is a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required