Abstract
In this chapter, you’ll investigate how to use Role Access Security (RAS) to protect resources. You’ll study the definitions that are found in .NET and how they work. Finally, you’ll learn about impersonation and how it works in .NET.
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2002 Jason Bock, Pete Stromquist, Tom Fischer, and Nathan Smith
About this chapter
Cite this chapter
Bock, J., Stromquist, P., Fischer, T., Smith, N. (2002). Role Access Security. In: .NET Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0846-4_5
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0846-4_5
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-59059-053-9
Online ISBN: 978-1-4302-0846-4
eBook Packages: Springer Book Archive