官术网_书友最值得收藏!

Designing the UserAuthentication database

Before we begin implementing a simple application that shows how data retrieved from the EDM can be consumed, let's take a quick look at the EDM again:

Designing the UserAuthentication database

As you can see in this diagram, our application needs to interact with the CSDL layer. The SSDL layer will connect to the database (the Security database in our example), and the mapping layer will map these two layers so that they can communicate.

The Security database comprises of a list of the following tables:

  • Users: This table contains the user details.
  • UsersAuthentication: This table contains the user authentication details.
  • UserAuthenticationTypes: This table contains user authentication type data. User authentication type can be Windows, Forms, Passport, and Anonymous.
  • UsersLoginHistory: This table contains data related to user login history; that is, the user login history data of the user.
  • UserRoles: This table contains the user role details.
  • Roles: This table contains the role details.
  • Controls: This table contains an entry per control (note that each control is an object).
  • ControlTypes: This table contains the control type data.
主站蜘蛛池模板: 大兴区| 长泰县| 东乡族自治县| 宁阳县| 浦城县| 新绛县| 搜索| 辽阳县| 崇信县| 剑阁县| 湖北省| 河西区| 金乡县| 青冈县| 子长县| 彰武县| 台山市| 甘德县| 方山县| 新疆| 永新县| 昌江| 遂川县| 修武县| 察雅县| 安康市| 静海县| 兰西县| 石城县| 湘潭县| 治县。| 桑植县| 台江县| 华阴市| 镇江市| 宣恩县| 乐昌市| 汉寿县| 平陆县| 泸州市| 卫辉市|