Chapter 8. Securing Your Application

In any business application, securing data and operations appropriately by restricting their access to approved users should be a significant factor in their design. Not doing so effectively opens the business to threats from snooping competitors, and even sabotage. Therefore, designing effective security into your application is extremely important.

This generally involves validating users' identities, tracking them and their assigned roles, and restricting their access to approved data and operations accordingly.

However, there are additional security-related considerations you should take into account when designing your Silverlight application. For example, if the application is being run outside of the corporate ...

Get Pro Business Applications with Silverlight 4 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.