O
- obscurity, Design Principles
- OLE DB .NET Data Provider, Using DPAPI Directly from ASP.NET
- one-way password hashes, Using the COM+ Catalog
- (see also )
- operating system identity flow, Choose an Authentication Approach, Authorization Approaches, Disadvantages of the Trusted Subsystem Model
- operations access, Choose an Authentication Approach, Using .NET Roles
- (see also )
- original caller identity flow., Choose an Authorization Strategy, Using Multiple Trusted Identities, Disadvantages of the Trusted Subsystem Model, SQL Authentication to the Database, Related Scenarios, ASP.NET to SQL Server, Using Integrated Windows Authentication at the Web Server, Programmatic Security, Hosting Multiple Web Applications, Accessing Network Resources, Using the Current Process Identity, Calling Serviced Components from ASP.NET, Configurable Security, Using the ConnectionGroupName Property, Proxy Server Authentication, Flowing the Caller’s Identity, Accessing Network Resources, Using the connectiongroupname Property, Using the Anonymous Internet User Account, The Database Trusts Different Roles
- (see also , )
- .NET remoting and, Accessing Network Resources, Using the connectiongroupname Property
- ASP.NET to Enterprise Services to SQL Server, Using Integrated Windows Authentication at the Web Server
- ASP.NET to SQL Server, ASP.NET to SQL Server
- data access security and, Using the Anonymous Internet User Account
- database trust and, The Database Trusts Different Roles
- Enterprise Services and, Using the Current Process Identity, Calling Serviced Components from ASP.NET
- impersonation/delegation model and, Using Multiple Trusted Identities
- intranet databases and, SQL Authentication to the Database, Related Scenarios
- resource access and, Choose an Authorization Strategy, Hosting Multiple Web Applications, Accessing Network Resources
- Web services and, Configurable Security, Using the ConnectionGroupName Property, Proxy Server Authentication, Flowing the Caller’s Identity
- Windows authentication with impersonation and, Programmatic Security
- overviews., Reference Hub (see )
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.