官术网_书友最值得收藏!

Designing the UserAuthentication database

Before we begin implementing a simple application that shows how data retrieved from the EDM can be consumed, let's take a quick look at the EDM again:

Designing the UserAuthentication database

As you can see in this diagram, our application needs to interact with the CSDL layer. The SSDL layer will connect to the database (the Security database in our example), and the mapping layer will map these two layers so that they can communicate.

The Security database comprises of a list of the following tables:

  • Users: This table contains the user details.
  • UsersAuthentication: This table contains the user authentication details.
  • UserAuthenticationTypes: This table contains user authentication type data. User authentication type can be Windows, Forms, Passport, and Anonymous.
  • UsersLoginHistory: This table contains data related to user login history; that is, the user login history data of the user.
  • UserRoles: This table contains the user role details.
  • Roles: This table contains the role details.
  • Controls: This table contains an entry per control (note that each control is an object).
  • ControlTypes: This table contains the control type data.
主站蜘蛛池模板: 永嘉县| 从江县| 阿拉善左旗| 大宁县| 仁化县| 朝阳区| 绿春县| 温宿县| 尼勒克县| 黄梅县| 城市| 舟曲县| 南木林县| 博乐市| 龙州县| 石城县| 平邑县| 集贤县| 渑池县| 什邡市| 吉林市| 和平区| 平泉县| 江口县| 焦作市| 永福县| 于田县| 舒城县| 涡阳县| 清苑县| 陇西县| 九台市| 黄陵县| 邢台市| 汉中市| 墨江| 犍为县| 自治县| 利辛县| 荣昌县| 合作市|