Export (0) Print
Expand All

Extending and Modifying the Security Application Block

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The latest Enterprise Library information can be found at the Enterprise Library site.

In its original state, the Security Application Block works well for typical security scenarios. However, there may be times when you have to customize some of the application block's behavior to better suit your application's particular requirements. There are two ways to do this, extension and modification.

Extending the Security Application Block

You extend the application block through designated extension points. Typically, these are custom classes, written by you, that implement a particular interface or derive from an abstract class. Because these custom classes exist in your application space, you do not have to modify or rebuild the application block. Instead, you designate your extensions using configuration settings.

Currently, you can extend the application block by creating new providers in addition to those provided with the application block, by implementing the interfaces that come with the application block. To help you create custom providers, the application block provides generic providers that you can use as a basis for your own functionality.

Modifying the Security Application Block

You modify the application block by making changes to the application block's source code. This may or may not require associated configuration changes. Because changes are made to the source code, you must rebuild the application block before the modifications take effect. You must also be prepared to handle support and versioning issues. To learn more, see Modifying the Security Application Block.

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The latest Enterprise Library information can be found at the Enterprise Library site.
Show:
© 2014 Microsoft