O'Reilly logo

Windows® Communication Foundation 4 Step by Step by John Sharp

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Protecting an Enterprise WCF Service

After completing this chapter, you will be able to:

  • Describe the different aspects of security that you should consider when implementing a WCF service.

  • Explain how to provide privacy and integrity of messages at the message level and at the transport level when communicating between a client application and a WCF service.

  • Explain how to configure a WCF service to authenticate users when running in a Windows environment and how a client application can provide a user’s credentials to a WCF service for authentication.

  • Describe how to define and use roles to authorize access to operations in a WCF service.

  • Summarize how a WCF service can use impersonation to provide fine-grained access control over resources ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required