Advertisement

.NET Security pp 159-183 | Cite as

Role Access Security

  • Jason Bock
  • Pete Stromquist
  • Tom Fischer
  • Nathan Smith

Abstract

In this chapter, you’ll investigate how to use Role Access Security (RAS) to protect resources. You’ll study the definitions that are found in .NET and how they work. Finally, you’ll learn about impersonation and how it works in .NET.

Keywords

Current User Current Window Code Snippet Current Identity Window User 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Jason Bock, Pete Stromquist, Tom Fischer, and Nathan Smith 2002

Authors and Affiliations

  • Jason Bock
  • Pete Stromquist
  • Tom Fischer
  • Nathan Smith

There are no affiliations available

Personalised recommendations