AzMan XML 配置或 SQL 配置,哪一种更安全?
我正在我的应用程序中实现基于 azman 角色的安全性。
我已经了解了如何使用 XML 或 SQL 来配置它。
但我无法理解哪一个更安全?
我正在为我的应用程序使用单击一次部署。
如果我通过单击一次部署来分发 xml 文件,如果某些用户修改 XML 文件并执行未经授权的任务怎么办?
与 SQL Server 相同,如果某个用户连接到 SQL Server 并更新角色怎么办?
我想知道哪一种更安全(XML 或 SQL)?有人可以帮我解释一下上述问题吗?
谢谢,
文卡特。
I am implementing the azman role based security in my application.
I have seen how to configure it either using XML or SQL.
But I am not able to understand which one is more secure?
I am using click once deployment for my application.
If I distribute the xml file with the click once deployment, what if some user modify the XML file and perform unauthorized tasks?
The same with SQL server, what if some user connected to SQL Server and update the roles?
I would like to know Which one is more secure(XML Or SQL)? Can some one please clarify me on the above questions?
Thanks,
Venkat.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
这两个选项都取决于您的应用程序的使用方式和地点,这两个选项都不能从您的帖子中推断出来。
但恕我直言,没有比其他选项“更安全”的选项了。它们都取决于谁有权访问您的 azman 商店所在的系统。
为了达到符合您要求的安全级别,您必须考虑所有这些因素,并可能为工程师和/或应用程序经理提供足够的文档。
Both options are dependant upon how and where your application will be used, neither of which can be deduced from your post.
But imho there is no option that is "more secure" than the other. Both of them are dependant on who has access to the system your azman store is located with what rights.
To reach a level of security that matches your requirements you will have to take all of that into consideration and probably provide adequate documentation for engineers and/or application managers.
您是否也在分发 SQL Server 数据库(如 SQL Server CE)?你没有说你是否会拥有一个集中拥有的数据库,或者每个用户都会获得自己的 .sdf 文件......
一个集中拥有的 SQL Server 数据库肯定会比许多数据库更容易实施特定的安全控制分布式 XML 文件,以及审核任何执行未经授权的修改或执行任何必要恢复的尝试。
Are you distributing the SQL Server database as well (like SQL Server CE) ? you didn't say whether you would have a centrally-owned database or would each user get their own .sdf file....
A centrally-owned SQL Server database would certainly make it easier to put specific security controls on than a lot of distributed XML files, as well as auditing any attempts to perform unauthorized modifications or perform any necessary restorations.