TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Access control
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Jean Paul (5)
Sarthak Varshney (2)
Abdul Basith (2)
Sardar Mudassar Ali Khan (2)
Rijwan Ansari (2)
Chiheb Chebbi (2)
Ashwani Tyagi (2)
Mohammad Elsheimy (2)
Aiswarya E V (1)
Tahir Ansari (1)
Jalpa Dhola (1)
Mohamed Shifan (1)
Muhammad Asif (1)
Sigar Dave (1)
Vikas Singh (1)
Lokendra Singh (1)
Babita (1)
Raj Kumar (1)
Sumit Gupta (1)
Munib Butt (1)
Raveena Attri (1)
Shiv Sharma (1)
Asad Ali (1)
Viknaraj Manogararajah (1)
Ziggy Rafiq (1)
Prabhakar Maurya (1)
Shashangka Shekhar (1)
Anubhav Chaudhary (1)
Onkar Sharma (1)
Mayooran Navamany (1)
Mahesh Chand (1)
Koshila Senadhira (1)
Cr Bhargavi (1)
Shrusti Shah (1)
Anupam Maiti (1)
Pravesh Dubey (1)
Sudeshna Sur (1)
Jayakumar Balasubramaniam (1)
Shriram Pophali (1)
Santosh Kumar Adidawarpu (1)
Kuppurasu Nagaraj (1)
Sibeesh Venu (1)
Francis (1)
Max McCarty (1)
Sharad Gupta (1)
krishnan.rama (1)
Visual Guard Novalys (1)
Related resources for Access control
No resource found
How to Set Permissions in Microsoft SharePoint
10/30/2024 7:03:23 AM.
Learn how to set permissions in Microsoft SharePoint effectively to ensure secure collaboration. This guide covers essential concepts, including permission levels, user access control, and managing si
Optimizing Angular Route Guards for Performance and Security
9/4/2024 6:13:15 AM.
Angular route guards manage access control in your application, ensuring users only access authorized routes. To optimize performance and security, implement lazy loading with CanLoad, cache permissio
Learn to Set Folder Unique Permission
8/28/2024 4:11:25 AM.
This feature ensures that only selected users or groups can view, edit, or manage the folder's contents, enhancing security and tailoring access to meet specific needs.
Create Azure File Share Using Azure Portal
8/22/2024 4:09:49 AM.
Azure File Share is a cloud-based storage service by Microsoft Azure that enables you to store, access, and share files securely over the internet. It supports both Windows and Linux systems, offers e
Explicit Interface Implementation & default interface methods in C#
7/3/2024 11:53:14 AM.
In C# programming, interface members serve as blueprints that classes must follow when implementing functionality. When multiple interfaces declare members with the same names, naming conflicts can ar
Channel Types in Microsoft Teams: Public, Private, and Shared
6/26/2024 6:39:55 AM.
Microsoft Teams offers Standard, Private, and Shared Channels to meet various communication needs. Standard Channels are open to all team members for general discussions. Shared Channels enable cross
Manage Role-Based Access Control (RBAC) in Azure
6/26/2024 5:19:08 AM.
Role-Based Access Control (RBAC) in Azure manages permissions by assigning roles to users, groups, and applications at various scopes, such as subscriptions or resource groups. This ensures users have
Understanding Access Modifiers in Java
6/13/2024 8:47:52 AM.
Explore the intricacies of Java access modifiers with this comprehensive guide. Learn about public, private, protected, and default access levels, their roles in encapsulation and access control, and
Tackling Security with the Sticky Bit
5/22/2024 10:59:23 AM.
Tackling Security with the Sticky Bit" delves into the pivotal role of the sticky bit in Linux file permissions. Explore how it enhances directory security by restricting deletion to file owners,
Authorization In Web API
5/17/2024 11:01:42 AM.
Learn how to implement robust authorization mechanisms in your Web API to secure endpoints and control access. Explore techniques like token-based authentication, OAuth, JWT, and role-based access con
Trick To Save User License For Integration In Dynamics CRM
5/7/2024 10:27:45 AM.
Discover effective strategies for managing user licenses in Dynamics CRM integration. Optimize costs, ensure security, and streamline user access while complying with licensing requirements for seamle
Using The Proxy Pattern In C#
5/7/2024 10:20:16 AM.
Explore the Proxy Pattern in C#, a structural design pattern facilitating controlled access to an object. Enhance security, logging, and lazy initialization for efficient client-server communication a
Unlocking the Power of Linux File Permissions
5/6/2024 11:13:29 AM.
In this article, we will Explore the potency of Linux file permissions, ensuring security and control over system resources. Master chmod, user/group management, and access levels for robust security.
Accessing User Information List in SharePoint
5/1/2024 11:36:22 AM.
Explore the ins and outs of accessing user information in SharePoint with our detailed guide. Learn the benefits, features, and limitations of leveraging user data, and follow our step-by-step instruc
View Contents Of Your Google Drive Using .NET
4/22/2024 11:10:08 AM.
In this article, we will Learn to access and view your Google Drive contents seamlessly using . NET. This tutorial guides you through integrating Google Drive API into your .NET applications, empoweri
Securing Your Workloads in VMware Cloud
4/22/2024 3:52:59 AM.
Fortify your VMware Cloud environment! Discover essential security practices for access control, networking, disaster recovery & more. #VMwareCloud #CloudSecurity
Alibaba Cloud Security Best Practices for Safeguarding Your Data
4/14/2024 5:24:57 AM.
Secure your data on Alibaba Cloud! Learn best practices for encryption, access control, & threat detection to ensure data security & compliance. #AlibabaCloudSecurity
Sign-In Page Customization for Specific Branding in Azure
4/11/2024 6:12:27 AM.
Customize sign-in pages in Azure to reflect your brand identity. Tailor visual elements, like logos and colors, for a seamless user experience. Enhance security and brand consistency while ensuring a
Best Practices for Maintaining Security and Preventing Vulnerabilities in C#
4/9/2024 5:54:03 PM.
Explore essential security practices in C# programming with Ziggy Rafiq, covering password hashing, input validation, SQL injection prevention, cryptography, HTTPS, secret management, and staying upda
Enable Remote Desktop Connection in Windows 8
4/8/2024 11:48:12 AM.
To enable Remote Desktop Connection in Windows 8, navigate to System Settings or Control Panel, locate Remote Desktop settings, enable Remote Desktop, configure network settings, adjust firewall setti
SharePoint Permissions - Important Aspects
4/4/2024 8:52:33 AM.
In this article I am trying to reveal the important permissions aspects of SharePoint 2010. Please note that this will be a subset of Security.
SharePoint Permissions: Part 2 of 3
4/3/2024 11:03:39 AM.
SharePoint Permissions: Part 2 of 3 covers access control, user roles, list and document library permissions, item-level permissions, inheritance, and management of SharePoint groups for effective gov
SQL Server: Grant Permission To A Particular Table
4/3/2024 10:47:46 AM.
In this article, we will learn how to manage database security in SQL Server by granting permissions to specific tables. Safeguard sensitive data and control access with precise authorization settings
How to Configure Permission For the Website on IIS
3/19/2024 11:55:53 AM.
In this article, you will learn the essential steps to configure website permissions on IIS, ensuring secure access control. Explore settings in IIS Manager to manage authentication methods, authoriza
How To Lock File And Folder Using Command Prompt (CMD) In Windows 10
2/27/2024 11:56:01 AM.
In this article, I have described how to Lock and Unlock any file and folder using the command prompt (Cmd) in windows 10.
Creating Azure Resource Groups, Advantages and Disadvantages
1/31/2024 7:14:38 AM.
Microsoft Azure employs Azure Resource Groups (RGs) for streamlined deployment and management. This guide explores creating, advantages, challenges, and best practices for effective cloud resource man
Manage Azure Subscription Owners: Add and Remove User Access
12/27/2023 4:36:28 AM.
Giving and taking away elevated privileges inside the Azure environment is what it means to designate and remove a user as an Owner of an Azure subscription. An owner has complete control over the sub
C# 2.0 Features: Property Accessor Accessibility Modifiers
10/20/2023 5:20:11 AM.
One of the new features added to C# version 2.0 is accessibility modifier support for property accessor. In this article, I will show you the advantages and coolness of using this feature.
How To integrate An Azure Storage Account With Azure Active Directory
10/17/2023 11:13:46 AM.
To integrate an Azure Storage Account with Azure Active Directory, you can use Azure AD authentication for your storage resources. This allows you to control access, implement role-based access contro
How To Activate Eligible Membership To A Privileged (PIM) Group?
10/16/2023 8:29:06 AM.
This article provides instructions on how to activate one’s eligible membership to a privileged (PIM) group.
Enhancing Security and Access Management with Microsoft Entra
8/24/2023 7:02:57 AM.
Unveiling Microsoft Entra: Elevating Secure Identity and Access Management" is a resource that likely introduces and explores Microsoft Entra, a solution focused on enhancing identity and access
Resolving CORS Origin Using Custom Middle ware in ASP.Net Web API
8/2/2023 5:02:53 AM.
In ASP.NET Core, middleware is a component or piece of software that sits in the request-response pipeline. Middleware is used to handle or modify incoming HTTP requests and outgoing HTTP responses. I
What is Non-Functional Requirements?
7/31/2023 10:54:15 AM.
A Non-Functional Requirement (NFR) is a type of requirement in software and system development that specifies criteria for the performance, behavior, and qualities of the system, rather than defining
Assigning A Built-in Role To A User At Resource And Resource Group Scope Using ARM Template
3/20/2022 11:39:02 AM.
This article is focused on creating an ARM template which will create a storage account resource in the resource group and will assign role at both RG (Resource Group) scope and created storage accoun
Azure AD Roles Vs Role-Based Access Control (RBAC)
1/17/2022 4:10:43 AM.
In this article, you will learn about the Difference between Azure AD Roles and Role-Based Access Control (RBAC).
Azure RBAC Role Based Access Control Demonstration With Azure App Service
4/10/2021 12:43:43 PM.
In this article, you will learn about Azure RBAC Role Based Access Control Demonstration with Azure App Service.
What Is Azure Role-Based Access Control (RBAC)
3/30/2021 1:18:36 PM.
In this article, you will learn what is Azure Role-Based Access Control (RBAC).
Access Control In Swift
8/20/2019 9:09:24 AM.
Access Control restricts the access to parts of your code from the code in other source files and modules.
POSIX Access Control Lists
8/2/2019 8:48:53 AM.
In this article, you will learn about POSIX access control lists.
Resolving "Access-Control-Allow-Origin Header Not Present" Error In Angular .NET Core API Calls
6/1/2018 7:53:05 AM.
Angular 4 is great and comes loaded with more features. You might be wondering why Angular 3 was skipped. They made it this way to unify all Angular components with the Angular Router (already develop
“Access-Control-Allow-Origin” – A Savior For Cross Domain Calls If Used Wisely
12/1/2016 1:54:11 PM.
In this article you will learn about “Access-Control-Allow-Origin” - a savior for cross domain calls if used wisely.
Missing Function Level Access Control And Its Prevention Mechanism
6/21/2016 10:07:08 AM.
In this article, you will learn about missing function level access control and its prevention mechanism.
Adding User Access Control To Azure Websites In The Azure Portal
4/25/2016 11:20:57 AM.
In this article you will learn how to add User Access control to Azure Websites in the Azure Portal by using the Azure portal.
Fix To No Access-Control-Allow-Origin Header Is Present Or Working With Cross Origin Request In ASP.NET Web API
3/12/2016 12:31:42 PM.
In this article we are going to learn about a few possible fixes we can apply when we get an error “Response to preflight request doesn’t pass access control check: No ‘Access-Control-Allow-Origin’ he
Access Server Side Controls In Client Side
12/29/2015 2:22:48 AM.
In this article have discussed how to access server side controls in client side.
Securing Your ASP.Net App Data That Has an Insecure Direct Object Reference
3/11/2015 5:56:45 PM.
In this article we will learn about measures for making your ASP.NET App Data Secure.
Windows Azure - How to Use Access Control Service in Our .NET Project: Part 1
1/7/2015 10:43:16 PM.
In this article I am going to show you how to use the Windows Azure Active directory Access Control.
Windows Azure - Authentication Using Facebook - ACS: Part 2
1/2/2015 7:44:38 PM.
This article explains how to do authentication in Window Azure's Access Control Services using Facebook.
Checking User Permission From HTML Client in LightSwitch 2012
7/10/2013 3:27:11 PM.
This article describes how to check user permissions from the HTML Client using LightSwitch in Visual Studio 2012.
Enable Authentication For Securing LightSwitch Application in Visual Studio 2012
4/24/2013 3:08:20 PM.
In this article I describe how to enable authentication using LightSwitch in Visual Studio 2012.
Access Control Modifier in PHP
2/18/2013 2:09:53 PM.
In this article I will go to explain access control modifier in PHP
Securing Your ASP.NET Web Applications
5/20/2012 12:56:33 AM.
Web application security is not just about attackers hacking websites, stealing sensitive information from websites, sending high traffic to websites with denial of service attacks, viruses, worms and Trojan horses. Are these are the only problems that we have? The answer is no. There are other problems that are frequently overlooked.
Access control for SaaS Application
12/5/2011 6:59:31 AM.
Are you creating a security system for a SaaS application? This article is here to help! It lists the important questions to ask from the beginning of your project to avoid security breaches or functional limitations that will hold you back later.
Windows Azure - AppFabric Access Control Service Programming
11/7/2011 10:20:28 PM.
In this article we are going to experiment with the Access Control feature using a Web Role. This article is a continuation of the Access Control feature in Azure AppFabric.
Windows Azure - AppFabric Access Control Service Portal
11/3/2011 2:26:09 AM.
As part of the Access Control Service, we are performing the following in this article. Create new Namespace, Using the Access Control Service Portal, Create new Identity Provider, and Create New Rule Group
Windows Azure - Introduction of AppFabric Access Control Service
11/3/2011 1:19:42 AM.
In this article we can explore the Access Control service of Windows Azure AppFabric.
Requesting Admin Approval at Application Start
10/16/2009 12:56:10 PM.
Learn how to make your application requests UAC elevation (in Windows Vista and later versions) at start.
Windows File and Registry Virtualization
10/6/2009 2:25:29 AM.
See how Windows Vista (and descendants) virtualizes file system and registry operations.