O'Reilly logo

Developing and Implementing Windows®-Based Applications with Visual C#™ .NET and Visual Studio® .NET Exam Cram™ 2 (Exam 70-316) by Priti Kalani, Amit Kalani, Kalani Kirk Hausman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring Authorization

Role-based security involves authentication and authorization. Authentication involves verifying the identity of the requesting account, and authorization refers to granting rights based on that identity.

In Windows applications, authentication is mainly based on the user's Windows login credentials. The user is authenticated as soon as he logs on to Windows, and this identity then is used by .NET applications to implement security. The .NET Framework provides various other forms of authentication, mainly used by ASP.NET applications. But you need to know about them because they are specified in the exam objectives.

The following list summarizes the various forms of authentication provided by the .NET Framework:

  • None— ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required