You are an enterprise application developer. You are creating a component for a distributed application for your company. The application manages the users access to sensitive company data. The company data is stored in an NTFS file system. Each file has permissions defined for domain users in an access control list (ACL).
The application must meet the following requirements in the same order of priority:
Secure access to sensitive information based on the users credentials.
Log authorization failures.
You need to use an appropriate authorization mechanism for the application. You need to achieve this by using the least amount of development effort. What should you do?
A.
Access files by using impersonation and the WindowsIdentity class.
B.
Access files after comparing roles by using the WindowsIdentity class and the FileSecurity class.
C.
Access files from a COM+ server package that is configured to run as the interactive user.
D.
Host the component in an IIS server and specify authorization rules in a Web.config file.