Chapter 11

Authentication and Access Control


  • Grasping the concept of authentication and access control in LightSwitch applications
  • Understanding the role and implementation of access control methods
  • Using the Windows authentication and Forms authentication models
  • Managing users and roles in a published LightSwitch application

No real line-of-business (LOB) applications can succeed without authenticating users and restricting their access to only those functions they are permitted by their position in the organizational structure of the company (or by some other kind of project or job assignment). Every company works with sensitive business information that is important to conceal not only from competing companies, but also from the eyes of non-privileged employees, partners, or suppliers.

By now, the ProjectTrek application you have built has ignored this important requirement for the sake of keeping the focus on building data, screens, and functionality. In this chapter, you learn about the authentication and access control concepts of LightSwitch, and, of course, how to apply them in your applications.


The designers of LightSwitch created the application architecture and the tools available in the IDE so that security is not an afterthought, but rather part of the standard development process. Many business application development projects suffer from a lack of thorough authentication and access ...

Get Beginning Visual Studio® LightSwitch Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.