Autodesk University
2013-04-17, 04:51 AM
Instructors: Serguei Sokolov - Autodesk, Inc.
Class Description: Only authorized and authenticated users should be able to access data with your CAD/GIS application. Controlling access with passwords and storing database access parameters in configuration files used to be the only option. It works, but users are burdened with remembering multiple identities and passwords and with keeping them synchronized. Deploying and securing configuration files for multiple users is another “nightmare” scenario for any system administrator. This session will examine ways to address these issues in the enterprise environment. We will review a role-based security model and demonstrate how this model can be implemented with Microsoft Active Directory or any other directory service. We will show basic steps and sample .NET code securing access to Autodesk Map 3D application and your valued data.
Class Description: Only authorized and authenticated users should be able to access data with your CAD/GIS application. Controlling access with passwords and storing database access parameters in configuration files used to be the only option. It works, but users are burdened with remembering multiple identities and passwords and with keeping them synchronized. Deploying and securing configuration files for multiple users is another “nightmare” scenario for any system administrator. This session will examine ways to address these issues in the enterprise environment. We will review a role-based security model and demonstrate how this model can be implemented with Microsoft Active Directory or any other directory service. We will show basic steps and sample .NET code securing access to Autodesk Map 3D application and your valued data.