Making Sense of Role-based Security (RBS)
A user and data security utility and enabler, pertaining to accessing confidential data, files, folders, information, systems, networks, servers et al. Authorizations and restrictions can be preset. Controlling who gets to see what is done through RBS or role-based security. Usernames, groups permissions levels are the nuts and bolts. There are three ways and settings, local user database, Active Directory Domain Services, or a custom user database. ACL’s or access control lists can also be set.
These specifies who are allowed, access, not restricted, and what they can do/what not is specified, monitored, tracked and effected. This type of protection, security protocols, are typically applied on an individual user basis. It is used to authenticate users and then authorizing them, pertaining to the permissions assigned to their relevant user accounts and group memberships. Which events can be logged and added to the event log, protect against attacks, breaches bypassing, unauthorized access is and can also be determined and preset. Custom authentication scheme implementation, access controls, encryption and cryptography come to life through RBS. This controls authorization for and by resources and restrict (file, registry, printers, event logs). CAS complements RBS type security.
Create custom authentication methods, database query, group memberships, which classes and interfaces to use and why, restricting access, protecting data through cryptography, usernames and password use, remote access permissions, improving security initiatives .NET Frameworks security features, built-in and by specification.
Key Exam Points
- Use, creation, maintenance of RBS for .NET Frameworks contexts and applications
- For the exam, study practical, illustrative, real-life, case and lab type solutions and examples for RBS, that help you to gain a better understanding of this topic.
- Do the practice test
See Also ACL, (SACL, DACL), AES, Authentication, Authorization, cipher, Symmetric, asymmetric encryption, Inherited permissions, Imperative RBS demands.
This article is based on the 2nd edition of the Microsoft .Net Framework Application Training Kit with the purpose to help 70-536 Exam takers to succeed. I constantly look for ways to improve the content. Please leave a comment about this article or drop me a message if you would like to see changes for this site.