官术网_书友最值得收藏!

Designing the UserAuthentication database

Before we begin implementing a simple application that shows how data retrieved from the EDM can be consumed, let's take a quick look at the EDM again:

Designing the UserAuthentication database

As you can see in this diagram, our application needs to interact with the CSDL layer. The SSDL layer will connect to the database (the Security database in our example), and the mapping layer will map these two layers so that they can communicate.

The Security database comprises of a list of the following tables:

  • Users: This table contains the user details.
  • UsersAuthentication: This table contains the user authentication details.
  • UserAuthenticationTypes: This table contains user authentication type data. User authentication type can be Windows, Forms, Passport, and Anonymous.
  • UsersLoginHistory: This table contains data related to user login history; that is, the user login history data of the user.
  • UserRoles: This table contains the user role details.
  • Roles: This table contains the role details.
  • Controls: This table contains an entry per control (note that each control is an object).
  • ControlTypes: This table contains the control type data.
主站蜘蛛池模板: 闻喜县| 巨鹿县| 河北省| 莒南县| 潜江市| 岳普湖县| 建宁县| 日照市| 沙田区| 台东市| 得荣县| 中山市| 怀宁县| 新巴尔虎右旗| 朝阳区| 鄂温| 凌云县| 万载县| 邮箱| 边坝县| 保亭| 含山县| 汉寿县| 奎屯市| 巴林左旗| 时尚| 休宁县| 永清县| 花莲县| 察雅县| 双峰县| 民乐县| 兰州市| 巴中市| 杭锦旗| 堆龙德庆县| 和顺县| 乌鲁木齐县| 民丰县| 榆树市| 石渠县|