Summary

In this chapter, we discussed the key features of the Security Application Block and have explored the elements of Authorization and Security Cache Providers. We have learned about the various required and optional assemblies. We saw how to configure the initial configuration and also the Authorization Rule Provider, Authorization Rules, as well as Security Cache Provider. We have also learned to authorize based on the configured rules and perform various operations such as saving, retrieving, and expiring instances of IIdentity, IPrincipal, and Profile objects using the Security Cache Provider. Finally, we observed how to implement a custom authorization provider.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.221.179.220