Authorizing Method and Property Requests

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The latest Enterprise Library information can be found at the Enterprise Library site.

Frequently, distributed applications use services and access classes that reside in separate security contexts. If the current user does not have permission to access a target class instance, an exception occurs that may be difficult to diagnose. Administrators and operators often find that a large proportion of application installation, setup, and run-time maintenance involves setting appropriate permissions and authorizing users and services.

The Policy Injection Application Block provides a handler that will check the authorization status of the requesting user or thread against the target class permissions before calling the target method or accessing the target property. The Authorization Handler takes advantage of the features exposed by the Enterprise Library Security Application Block, using an authorization provider defined in the application configuration.

For more details about authorizing requests to members of a class using the Policy Injection Application Block, see The Authorization Handler in the section Configuring and Using Custom Matching Rules.

The Security Application Block provides a comprehensive set of features for working with user identities and authorization. For details about using the Security Application Block, see Introduction to the Security Application Block.

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The latest Enterprise Library information can be found at the Enterprise Library site.
Show: