- Entity Framework Tutorial(Second Edition)
- Joydip Kanjilal
- 177字
- 2021-07-16 20:41:55
Designing the UserAuthentication database
Before we begin implementing a simple application that shows how data retrieved from the EDM can be consumed, let's take a quick look at the EDM again:

As you can see in this diagram, our application needs to interact with the CSDL layer. The SSDL layer will connect to the database (the Security
database in our example), and the mapping layer will map these two layers so that they can communicate.
The Security
database comprises of a list of the following tables:
Users
: This table contains the user details.UsersAuthentication
: This table contains the user authentication details.UserAuthenticationTypes
: This table contains user authentication type data. User authentication type can beWindows
,Forms
,Passport
, andAnonymous
.UsersLoginHistory
: This table contains data related to user login history; that is, the user login history data of the user.UserRoles
: This table contains the user role details.Roles
: This table contains the role details.Controls
: This table contains an entry per control (note that each control is an object).ControlTypes
: This table contains the control type data.
推薦閱讀
- MySQL 8從入門到精通(視頻教學版)
- 華為HMS生態與應用開發實戰
- Kali Linux Wireless Penetration Testing Beginner's Guide(Third Edition)
- Learning Raspbian
- Getting Started with Laravel 4
- 軟件供應鏈安全:源代碼缺陷實例剖析
- TMS320LF240x芯片原理、設計及應用
- Hands-On JavaScript for Python Developers
- IDA Pro權威指南(第2版)
- 大學計算機基礎
- PyQt編程快速上手
- Mudbox 2013 Cookbook
- Mastering OpenStack
- MySQL核心技術與最佳實踐
- PHP程序設計經典300例