SlideShare uma empresa Scribd logo
1 de 34
Getting Started with Enterprise Library 3.0  in ASP.NET Alex Homer [email_address]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Enterprise Library? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is Enterprise Library? ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Application Blocks (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Application Blocks (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Blocks and Dependencies Security Crypto Configuration Data  Access Logging Caching Exception Handling Dependency Plug-in Config Tools Core Policy Injection Validation
Instrumentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library Architecture
Configuration Tools Graphical stand-alone Configuration Console and Visual Studio 2005 Configuration Editor Both create or modify App.config or Web.config
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Installing Enterprise Library ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Quick Start Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Quick Start Examples ,[object Object]
Running the Quick Starts  Demo
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library and ASP.NET ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library in ASP.NET  Demo
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trust Levels and Permissions Root  Web.config  file Medium   trust  definitions  file Low trust  definitions  file Minimal trust  definitions  file Application Web.config  file High trust  definitions  file Internal default settings
Trust Levels and Permissions Root  Web.config  file Medium   trust  definitions  file Low trust  definitions  file Minimal trust  definitions  file Application Web.config  file High trust  definitions  file <trust level=&quot;High&quot;  originUrl=&quot;&quot; /> Internal default settings
Trust Levels and Permissions Root  Web.config  file Medium   trust  definitions  file Low trust  definitions  file Minimal trust  definitions  file Application Web.config  file High trust  definitions  file <trust level=&quot;High&quot;  originUrl=&quot;&quot; /> <system.web> <securityPolicy> <trustLevel name=&quot;Full&quot;  policyFile=&quot;internal&quot; /> <trustLevel name=&quot;High&quot;  policyFile=&quot;web_hightrust.config&quot; /> ... </securityPolicy> <trust level=&quot;Full&quot; originUrl=&quot;&quot; /> </system.web> Internal default settings
Trust Levels and Permissions Internal default settings Root  Web.config  file Medium   trust  definitions  file Low trust  definitions  file Minimal trust  definitions  file Application Web.config  file High trust  definitions  file <SecurityClass Name=&quot;FileIOPermission&quot; ... /> <IPermission class=&quot;FileIOPermission&quot; version=&quot;1&quot; Read=&quot;$AppDir$&quot; Write=&quot;$AppDir$&quot; Append=&quot;$AppDir$&quot;  PathDiscovery=&quot;$AppDir$&quot; /> <trust level=&quot;High&quot;  originUrl=&quot;&quot; /> <system.web> <securityPolicy> <trustLevel name=&quot;Full&quot;  policyFile=&quot;internal&quot; /> <trustLevel name=&quot;High&quot;  policyFile=&quot;web_hightrust.config&quot; /> ... </securityPolicy> <trust level=&quot;Full&quot; originUrl=&quot;&quot; /> </system.web>
Partial Trust ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Partial Trust ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Partial Trust ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Using Partial Trust in ASP.NET  Demo
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Writing Custom Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cache Backing Store Providers ,[object Object],[object Object],[object Object]
Caching Block ,[object Object],[object Object],[object Object]
A Custom Caching Provider  Demo
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http ://www.codeplex.com

Mais conteúdo relacionado

Destaque (11)

Spatial SQL
Spatial SQLSpatial SQL
Spatial SQL
 
Data 101
Data 101Data 101
Data 101
 
ADO.NET Entity Framework
ADO.NET Entity FrameworkADO.NET Entity Framework
ADO.NET Entity Framework
 
Data Modeling Basics
Data Modeling BasicsData Modeling Basics
Data Modeling Basics
 
Importance of data model
Importance of data modelImportance of data model
Importance of data model
 
Data Modeling Presentations I
Data Modeling Presentations IData Modeling Presentations I
Data Modeling Presentations I
 
All data models in dbms
All data models in dbmsAll data models in dbms
All data models in dbms
 
Different data models
Different data modelsDifferent data models
Different data models
 
Data modelling 101
Data modelling 101Data modelling 101
Data modelling 101
 
Data Modeling PPT
Data Modeling PPTData Modeling PPT
Data Modeling PPT
 
Dbms models
Dbms modelsDbms models
Dbms models
 

Semelhante a Getting Started with Enterprise Library 3.0 in ASP.NET

TechDays 2010 Portugal - Scaling your data tier with app fabric 16x9
TechDays 2010 Portugal - Scaling your data tier with app fabric 16x9TechDays 2010 Portugal - Scaling your data tier with app fabric 16x9
TechDays 2010 Portugal - Scaling your data tier with app fabric 16x9
Nuno Godinho
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
guest879f38
 

Semelhante a Getting Started with Enterprise Library 3.0 in ASP.NET (20)

Enterprise Library 3.0 Overview
Enterprise Library 3.0 OverviewEnterprise Library 3.0 Overview
Enterprise Library 3.0 Overview
 
Migration testing framework
Migration testing frameworkMigration testing framework
Migration testing framework
 
Actor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active DirectoryActor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active Directory
 
ESM Asset Model FlexConnector Developer's Guide for ESM 6.8c
ESM Asset Model FlexConnector Developer's Guide for ESM 6.8cESM Asset Model FlexConnector Developer's Guide for ESM 6.8c
ESM Asset Model FlexConnector Developer's Guide for ESM 6.8c
 
Windows Server AppFabric Caching - What it is & when you should use it?
Windows Server AppFabric Caching - What it is & when you should use it?Windows Server AppFabric Caching - What it is & when you should use it?
Windows Server AppFabric Caching - What it is & when you should use it?
 
Implementing application security using the .net framework
Implementing application security using the .net frameworkImplementing application security using the .net framework
Implementing application security using the .net framework
 
Ibm
IbmIbm
Ibm
 
Asset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's GuideAsset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's Guide
 
Asset modelimportconn devguide_5.2.1.6190.0
Asset modelimportconn devguide_5.2.1.6190.0Asset modelimportconn devguide_5.2.1.6190.0
Asset modelimportconn devguide_5.2.1.6190.0
 
Asset modelimportconn devguide_5.2.1.6190.0
Asset modelimportconn devguide_5.2.1.6190.0Asset modelimportconn devguide_5.2.1.6190.0
Asset modelimportconn devguide_5.2.1.6190.0
 
Internet Explorer 8 for Developers by Christian Thilmany
Internet Explorer 8 for Developers by Christian ThilmanyInternet Explorer 8 for Developers by Christian Thilmany
Internet Explorer 8 for Developers by Christian Thilmany
 
TechDays 2010 Portugal - Scaling your data tier with app fabric 16x9
TechDays 2010 Portugal - Scaling your data tier with app fabric 16x9TechDays 2010 Portugal - Scaling your data tier with app fabric 16x9
TechDays 2010 Portugal - Scaling your data tier with app fabric 16x9
 
Enterprise Library 2.0 Core Architecture
Enterprise Library 2.0 Core ArchitectureEnterprise Library 2.0 Core Architecture
Enterprise Library 2.0 Core Architecture
 
Securing Portlets With Spring Security
Securing Portlets With Spring SecuritySecuring Portlets With Spring Security
Securing Portlets With Spring Security
 
Improving code quality using CI
Improving code quality using CIImproving code quality using CI
Improving code quality using CI
 
2310 b 15
2310 b 152310 b 15
2310 b 15
 
2310 b 15
2310 b 152310 b 15
2310 b 15
 
Integration Testing in Python
Integration Testing in PythonIntegration Testing in Python
Integration Testing in Python
 
Ajax to the Moon
Ajax to the MoonAjax to the Moon
Ajax to the Moon
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Getting Started with Enterprise Library 3.0 in ASP.NET

  • 1. Getting Started with Enterprise Library 3.0 in ASP.NET Alex Homer [email_address]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Blocks and Dependencies Security Crypto Configuration Data Access Logging Caching Exception Handling Dependency Plug-in Config Tools Core Policy Injection Validation
  • 8.
  • 10. Configuration Tools Graphical stand-alone Configuration Console and Visual Studio 2005 Configuration Editor Both create or modify App.config or Web.config
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Running the Quick Starts Demo
  • 17.
  • 18.
  • 19. Enterprise Library in ASP.NET Demo
  • 20.
  • 21. Trust Levels and Permissions Root Web.config file Medium trust definitions file Low trust definitions file Minimal trust definitions file Application Web.config file High trust definitions file Internal default settings
  • 22. Trust Levels and Permissions Root Web.config file Medium trust definitions file Low trust definitions file Minimal trust definitions file Application Web.config file High trust definitions file <trust level=&quot;High&quot; originUrl=&quot;&quot; /> Internal default settings
  • 23. Trust Levels and Permissions Root Web.config file Medium trust definitions file Low trust definitions file Minimal trust definitions file Application Web.config file High trust definitions file <trust level=&quot;High&quot; originUrl=&quot;&quot; /> <system.web> <securityPolicy> <trustLevel name=&quot;Full&quot; policyFile=&quot;internal&quot; /> <trustLevel name=&quot;High&quot; policyFile=&quot;web_hightrust.config&quot; /> ... </securityPolicy> <trust level=&quot;Full&quot; originUrl=&quot;&quot; /> </system.web> Internal default settings
  • 24. Trust Levels and Permissions Internal default settings Root Web.config file Medium trust definitions file Low trust definitions file Minimal trust definitions file Application Web.config file High trust definitions file <SecurityClass Name=&quot;FileIOPermission&quot; ... /> <IPermission class=&quot;FileIOPermission&quot; version=&quot;1&quot; Read=&quot;$AppDir$&quot; Write=&quot;$AppDir$&quot; Append=&quot;$AppDir$&quot; PathDiscovery=&quot;$AppDir$&quot; /> <trust level=&quot;High&quot; originUrl=&quot;&quot; /> <system.web> <securityPolicy> <trustLevel name=&quot;Full&quot; policyFile=&quot;internal&quot; /> <trustLevel name=&quot;High&quot; policyFile=&quot;web_hightrust.config&quot; /> ... </securityPolicy> <trust level=&quot;Full&quot; originUrl=&quot;&quot; /> </system.web>
  • 25.
  • 26.
  • 27.
  • 28. Using Partial Trust in ASP.NET Demo
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. A Custom Caching Provider Demo
  • 34.