Authorization


Check

Description

Calling users are restricted using declarative or imperative principal permission checks (normally performed by business logic).

Calling code is restricted using identity permission demands in scenarios where you know and want to limit the calling code.

Application login is restricted in the database and can only execute selected stored procedures. Application's login has no direct table access.




Improving Web Application Security. Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures
ISBN: 0735618429
EAN: 2147483647
Year: 2003
Pages: 613

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net