官术网_书友最值得收藏!

Designing the UserAuthentication database

Before we begin implementing a simple application that shows how data retrieved from the EDM can be consumed, let's take a quick look at the EDM again:

Designing the UserAuthentication database

As you can see in this diagram, our application needs to interact with the CSDL layer. The SSDL layer will connect to the database (the Security database in our example), and the mapping layer will map these two layers so that they can communicate.

The Security database comprises of a list of the following tables:

  • Users: This table contains the user details.
  • UsersAuthentication: This table contains the user authentication details.
  • UserAuthenticationTypes: This table contains user authentication type data. User authentication type can be Windows, Forms, Passport, and Anonymous.
  • UsersLoginHistory: This table contains data related to user login history; that is, the user login history data of the user.
  • UserRoles: This table contains the user role details.
  • Roles: This table contains the role details.
  • Controls: This table contains an entry per control (note that each control is an object).
  • ControlTypes: This table contains the control type data.
主站蜘蛛池模板: 安徽省| 泽库县| 南开区| 民勤县| 临清市| 德州市| 洮南市| 金寨县| 诏安县| 陈巴尔虎旗| 库伦旗| 靖远县| 建始县| 沅陵县| 武城县| 吉木萨尔县| 岐山县| 百色市| 贵溪市| 三门县| 九龙城区| 太和县| 尖扎县| 钦州市| 高阳县| 武威市| 卢氏县| 五指山市| 霍州市| 碌曲县| 密云县| 德州市| 临夏县| 洞头县| 浦县| 定西市| 张掖市| 吴忠市| 嵩明县| 杂多县| 乌鲁木齐县|