官术网_书友最值得收藏!

Designing the UserAuthentication database

Before we begin implementing a simple application that shows how data retrieved from the EDM can be consumed, let's take a quick look at the EDM again:

Designing the UserAuthentication database

As you can see in this diagram, our application needs to interact with the CSDL layer. The SSDL layer will connect to the database (the Security database in our example), and the mapping layer will map these two layers so that they can communicate.

The Security database comprises of a list of the following tables:

  • Users: This table contains the user details.
  • UsersAuthentication: This table contains the user authentication details.
  • UserAuthenticationTypes: This table contains user authentication type data. User authentication type can be Windows, Forms, Passport, and Anonymous.
  • UsersLoginHistory: This table contains data related to user login history; that is, the user login history data of the user.
  • UserRoles: This table contains the user role details.
  • Roles: This table contains the role details.
  • Controls: This table contains an entry per control (note that each control is an object).
  • ControlTypes: This table contains the control type data.
主站蜘蛛池模板: 城固县| 连江县| 安化县| 康平县| 武宁县| 望谟县| 易门县| 东乌| 两当县| 托里县| 伊宁市| 昌都县| 克拉玛依市| 东港市| 北安市| 秀山| 紫金县| 梁山县| 应用必备| 吐鲁番市| 蕲春县| 宁波市| 海淀区| 夏邑县| 辽宁省| 旬邑县| 安吉县| 石首市| 天峻县| 遂川县| 延安市| 隆子县| 集安市| 博兴县| 同德县| 伊春市| 原阳县| 乃东县| 富顺县| 且末县| 桦甸市|