官术网_书友最值得收藏!

Designing the UserAuthentication database

Before we begin implementing a simple application that shows how data retrieved from the EDM can be consumed, let's take a quick look at the EDM again:

Designing the UserAuthentication database

As you can see in this diagram, our application needs to interact with the CSDL layer. The SSDL layer will connect to the database (the Security database in our example), and the mapping layer will map these two layers so that they can communicate.

The Security database comprises of a list of the following tables:

  • Users: This table contains the user details.
  • UsersAuthentication: This table contains the user authentication details.
  • UserAuthenticationTypes: This table contains user authentication type data. User authentication type can be Windows, Forms, Passport, and Anonymous.
  • UsersLoginHistory: This table contains data related to user login history; that is, the user login history data of the user.
  • UserRoles: This table contains the user role details.
  • Roles: This table contains the role details.
  • Controls: This table contains an entry per control (note that each control is an object).
  • ControlTypes: This table contains the control type data.
主站蜘蛛池模板: 松原市| 定兴县| 恩平市| 周宁县| 法库县| 凤阳县| 鸡西市| 石家庄市| 夹江县| 永平县| 康马县| 平阴县| 松溪县| 绥宁县| 濉溪县| 方山县| 酒泉市| 泗水县| 都江堰市| 陇南市| 石家庄市| 阆中市| 漯河市| 卫辉市| 襄樊市| 桃江县| 河北省| 枝江市| 项城市| 新竹市| 阳谷县| 行唐县| 衡南县| 庆安县| 龙里县| 四子王旗| 邻水| 罗定市| 茌平县| 灵山县| 丰县|