- Entity Framework Tutorial(Second Edition)
- Joydip Kanjilal
- 177字
- 2021-07-16 20:41:55
Designing the UserAuthentication database
Before we begin implementing a simple application that shows how data retrieved from the EDM can be consumed, let's take a quick look at the EDM again:

As you can see in this diagram, our application needs to interact with the CSDL layer. The SSDL layer will connect to the database (the Security
database in our example), and the mapping layer will map these two layers so that they can communicate.
The Security
database comprises of a list of the following tables:
Users
: This table contains the user details.UsersAuthentication
: This table contains the user authentication details.UserAuthenticationTypes
: This table contains user authentication type data. User authentication type can beWindows
,Forms
,Passport
, andAnonymous
.UsersLoginHistory
: This table contains data related to user login history; that is, the user login history data of the user.UserRoles
: This table contains the user role details.Roles
: This table contains the role details.Controls
: This table contains an entry per control (note that each control is an object).ControlTypes
: This table contains the control type data.
推薦閱讀
- GAE編程指南
- .NET之美:.NET關鍵技術深入解析
- JavaScript百煉成仙
- PyTorch自動駕駛視覺感知算法實戰
- 單片機C語言程序設計實訓100例:基于STC8051+Proteus仿真與實戰
- AIRAndroid應用開發實戰
- Python測試開發入門與實踐
- Visual FoxPro程序設計習題集及實驗指導(第四版)
- Apache Camel Developer's Cookbook
- 創意UI:Photoshop玩轉APP設計
- 實戰Java高并發程序設計(第2版)
- Learning Ionic
- Data Science Algorithms in a Week
- 數據結構:Python語言描述
- Bitcoin Essentials