O'Reilly logo

.NET Programming: A Practical Guide Using C# by Pradeep Tapadiya

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Role-Based Security

Many applications require that different users be grouped based on the privileges they have. Typically, these applications check the group, or role, of a user and provide access to the resources based on the role. For example, an employee salary management application may provide access to employee salaries only if the current user belongs to the Manager role. Even Windows NT (Windows 2000 and all subsequent versions are based on Windows NT technology) was built with a role-based security architecture: It grants or denies access to secured resources based on the local group to which a user belongs. A Windows NT user that belongs to the Administrators role has complete and unrestricted access to the computer, whereas a user ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required