Professional Documents
Culture Documents
SynapseIndia DOTNET Development Platform Overview
SynapseIndia DOTNET Development Platform Overview
SynapseIndia DOTNET Development Platform Overview
Outline
What is .NET?
A comprehensive XML Web Services platform
Visual Studio
Language Neutrality
CLR doesnt know what language it is running. There
are more than 25 languages for .NET, including
COBOL, PERL, Eiffel and Java!
CLS objects are cross-language. A VB.NET class can be
created as an object in PERL and then passed to a
COBOL method!
Role-Based Security
Programmers can use role-based security to control access to
methods or properties at run-time.
Isolate security from code logic by applying attributes defined
in System.Security or EnterpriseServices
System.Security is feature-rich, but is limited to Windows user
groups.
EnterpriseServices uses COM+ roles for more flexibility but
classes must inherit from EnterpriseServices
You can implement your own security provider for databases,
LDAP,
Evidence-Based Security
Evidence is the characteristics of the code such as its
directory or digital signature.
Code Groups are logical groupings of code with evidence
that satisfies certain conditions like
<Directory=c:\winnt\> or <URL=UseDotNet.com>.
Named Permission Sets define the permissions applied to
Code Groups.
Application Domain Hosts such as browsers or the shell can
enforce more restrictive permissions and, if trusted, provide
evidence about the hosted assembly to the CLR.
Evidence-Based Security
Effective Permissions are determined by calculating the intersection
of Named Permissions granted at each Policy Level.
Each Policy Level grants permissions based on the union of Named
Permissions for all matching Code Groups defined at that level.
Attributes can be applied to Code Groups in each policy level to
modify the default determination.
The effect is for least restrictive permissions within a Policy Level
(unless nothing is specified) but most restrictive permissions
when Policy Levels are combined.
Enterprise, Machine, User and Application policies are adhered to
but defined independently.