April 2002
Intermediate to advanced
816 pages
20h 56m
English
By Matthew Lyons
IN THIS CHAPTER
So far we have covered the difference between user identity and code identity, and we have examined in detail how code identity is constructed using evidence. Identity by itself isn't enough, though. The only thing that evidence provides is authentication—a way to ensure that we have identified a piece of code. What we are still missing is a set of privileges and an authorization mechanism to map identities to those privileges. This chapter will cover the privileges, or permissions, in .NET terminology.
Roughly speaking, a permission is ...
Read now
Unlock full access