13
Implementing Security Models for the Access Web App
WHAT'S IN THIS CHAPTER?
- Recognizing differences in security architecture
- Reviewing traditional security methods in client .accdbs
- Learning about SharePoint security
- Designing a secure web app
WROX.COM CODE DOWNLOADS FOR THIS CHAPTER
The code and sample downloads for this chapter are found at www.wiley.com/go/proaccess2013prog.com on the Download Code tab. The code is in the Chapter 13 download and individually named according to the names listed throughout the chapter. The app packages for the web apps in this chapter are called Maid to Order and Maid to Order Customer. Refer to the Readme.txt file also located there for installation instructions.
In this chapter, you learn about securing your applications. Because a complete application will often include both a web app component and a client database component, our discussion covers both environments. We start with a review of the different architectures involved. You then investigate the design elements required for a successful security implementation. You learn what features are available to you out of the box and what you need to do to augment those out-of-the-box features.
You learn about managing SharePoint accounts, which are needed to access, read, modify data, and design the web app hosted on the site. Once you master the essential operations to manage users, we turn to embedding security in your web app and discuss strategies for enforcing it effectively.
The ...
Get Professional Access 2013 Programming now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.