March 2012
Intermediate to advanced
734 pages
17h 10m
English
In the next set of chapters, you'll look at some of the security-related aspects of LightSwitch. You'll start with authentication, the process that determines the identity of your user. This is perhaps the most important part of LightSwitch security. Unless you can correctly identify your user, you won't be able to restrict what users can do in your application. You also won't be able to apply any useful security auditing, because you'll be missing a key piece of information.
LightSwitch has three authentication options that you can choose from (one of which has two “flavors”):
- No authentication, which also means that no authorization is possible
- Windows Authentication, using the Windows identities ...