After completing this chapter, you will be able to:
Describe the different aspects of security that you should consider when implementing a WCF service.
Explain how to provide privacy and integrity of messages at the message level and at the transport level when communicating between a client application and a WCF service.
Explain how to configure a WCF service to authenticate users when running in a Windows environment and how a client application can provide a user’s credentials to a WCF service for authentication.
Describe how to define and use roles to authorize access to operations in a WCF service.
Summarize how a WCF service can use impersonation to provide fine-grained access control over resources ...