.NET Security pp 159-183 | Cite as

Role Access Security

  • Jason Bock
  • Pete Stromquist
  • Tom Fischer
  • Nathan Smith

Abstract

In this chapter, you’ll investigate how to use Role Access Security (RAS) to protect resources. You’ll study the definitions that are found in .NET and how they work. Finally, you’ll learn about impersonation and how it works in .NET.

Keywords

Dition 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Jason Bock, Pete Stromquist, Tom Fischer, and Nathan Smith 2002

Authors and Affiliations

  • Jason Bock
  • Pete Stromquist
  • Tom Fischer
  • Nathan Smith

There are no affiliations available

Personalised recommendations