- Entity Framework Tutorial(Second Edition)
- Joydip Kanjilal
- 177字
- 2021-07-16 20:41:55
Designing the UserAuthentication database
Before we begin implementing a simple application that shows how data retrieved from the EDM can be consumed, let's take a quick look at the EDM again:

As you can see in this diagram, our application needs to interact with the CSDL layer. The SSDL layer will connect to the database (the Security
database in our example), and the mapping layer will map these two layers so that they can communicate.
The Security
database comprises of a list of the following tables:
Users
: This table contains the user details.UsersAuthentication
: This table contains the user authentication details.UserAuthenticationTypes
: This table contains user authentication type data. User authentication type can beWindows
,Forms
,Passport
, andAnonymous
.UsersLoginHistory
: This table contains data related to user login history; that is, the user login history data of the user.UserRoles
: This table contains the user role details.Roles
: This table contains the role details.Controls
: This table contains an entry per control (note that each control is an object).ControlTypes
: This table contains the control type data.
推薦閱讀
- 自然語言處理實戰:預訓練模型應用及其產品化
- OpenDaylight Cookbook
- Delphi程序設計基礎:教程、實驗、習題
- Practical Data Science Cookbook(Second Edition)
- Hands-On C++ Game Animation Programming
- CouchDB and PHP Web Development Beginner’s Guide
- Learning Apache Mahout Classification
- 深入理解Android:Wi-Fi、NFC和GPS卷
- Learning JavaScript Data Structures and Algorithms
- Angular開發入門與實戰
- SQL Server數據庫管理與開發兵書
- Java SE實踐教程
- Mastering PowerCLI
- 深入理解Java虛擬機:JVM高級特性與最佳實踐
- 基于MATLAB的控制系統仿真及應用