Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Getting Started

Now you know that you should segment schemas and user accounts. Within user accounts, you need to further divide by function and profile. One effective way to begin these tasks is to divide the user community into four coarse-level groups. These groups are coarse-level and are intended to be such so as to simplify the discussions. This provides the smallest, yet most prevalent, use cases as we discuss security patterns, so the focus can be on the categorizations as opposed to anything else.

We’ll use the term user profiles to refer to the categories in which user populations are divided. These user profiles allow you to think about the basic requirements and then attach them to an appropriate design pattern. Quite simply, it’s a needed first step to designing security correctly. You should be able to use this methodology when you build and design your applications. The intent here is not to solve or complete the design, but to provide a foundation and foundational understanding of what needs to be done and why from a security perspective.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint