• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Summary

The information that I’ve gone over in this chapter has provided you with powerful systems for security and will enable you to control what content a user—either anonymous or authenticated—can see. These tools can be used in intranet settings where the flow and level of information must be controlled. Or you may use them in an Internet site that is membership-based and in which members can buy different levels of access. The authentication systems and authorization systems present in the .NET Framework will go a long way in helping you protect and secure your applications.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint