What should you use for authorization?

You are designing an enterprise‐level Windows Communication Foundation (WCF) application. User
accounts will migrate from the existing system. The new system must be able to scale to
accommodate the increasing load.
You need to ensure that the application can handle large‐scale role changes.
What should you use for authorization? (Each correct answer presents a complete solution. Choose
all that apply.)

You are designing an enterprise‐level Windows Communication Foundation (WCF) application. User
accounts will migrate from the existing system. The new system must be able to scale to
accommodate the increasing load.
You need to ensure that the application can handle large‐scale role changes.
What should you use for authorization? (Each correct answer presents a complete solution. Choose
all that apply.)

A.
Resource‐based trusted subsystem model

B.
Identity‐based approach

C.
Role‐based approach

D.
Resource‐based impersonation/delegation model

Explanation:
Advanced Maturity: Authorization as a Service

In the advanced level of maturity for authorization, role storage and management is consolidated
and authorization itself is a service available to any solution that is service‐enabled.

* The Trusted Subsystems Model
Once authorization is available as an autonomous service, the need for impersonation is eliminated.
Instead of assuming the identity of the user, the application uses its own credentials to access
services and resources, but it captures the user’s identity and passes it as a parameter (or token) to
be used for authorization when a request is made. This model is referred to as the trusted
subsystem model, because the application acts as a trusted subsystem within the security domain.



Leave a Reply 5

Your email address will not be published. Required fields are marked *


Meta Coder

Meta Coder

Correct Answer: A and C

Iron

Iron

Please explain WHY are you saying so.

scbeast

scbeast

In enterprise-level applications where scalability is essential, a role-based or identity-based approach for authorization is the best choice. For small-scale intranet applications that serve per-user content from resources (such as files) that can be secured with Windows ACLs, a resource-based approach may be appropriate.

https://msdn.microsoft.com/en-us/library/ff647503.aspx

kasp

kasp

I agree. Based on this reference. B and C are correct.