.NET Framework Security
by Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, Kevin T. Price
Summary
So, what have you learned in this chapter? First, you saw how permissions or permission set instances can be created and then acted on by a security operation either declaratively or imperatively:
Imperative operations look like normal method calls. They are the most flexible form of security request because all parameters of the call can be dynamically computed.
Declarative operations are specified in the form of attributes attached to the assembly, classes, or methods. They are less flexible than imperative calls because all parameters values are statically computed at compile time. However, there are a couple of operations available declaratively that aren't available to imperative calls—LinkDemand and InheritanceDemand. LinkDemand ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access