Which two approaches can you use for authorization?

You are designing an enterprise-level Windows Communication Foundation (WCF) application. User accounts will migrate from the existing system. The new system must be able to scale to accommodate the increasing load.
You need to ensure that the application can handle large-scale role changes.
Which two approaches can you use for authorization?
A. Resource-based trusted subsystem model
B. Identity-based approach
C. Role-based approach
D. Resource-based impersonation/delegation model

microsoft-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.