Role-Based Security
Many applications require that different users be grouped based on the privileges they have. Typically, these applications check the group, or role, of a user and provide access to the resources based on the role. For example, an employee salary management application may provide access to employee salaries only if the current user belongs to the Manager role. Even Windows NT (Windows 2000 and all subsequent versions are based on Windows NT technology) was built with a role-based security architecture: It grants or denies access to secured resources based on the local group to which a user belongs. A Windows NT user that belongs to the Administrators role has complete and unrestricted access to the computer, whereas a user ...
Get .NET Programming: A Practical Guide Using C# now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.