Databases Reference
In-Depth Information
Figure 12-14. The Permissions tab
Everyone: Any request for the operation against the table is accepted. With this option,
your data is wide open to everyone.
Anybody with the Application Key: The application key is required to perform the
operation. The application key is distributed with the application. Because this key is not
securely distributed, it cannot be considered a security token. To secure access to your
mobile service data, you must instead authenticate users before accessing.
Only Authenticated Users: Only authenticated users are permitted to perform the
operation. In this preview release, Windows 8 app clients are authenticated by Live Connect.
Scripts can be used to further restrict access to tables based on an authenticated user.
Only Scripts and Admins: The operation requires the service master key, which limits the
operation only to registered scripts or to administrator accounts.
Depending on the type and sensitivity of the data , it is recommended that the Everyone option be used sparingly.
If there is data that needs protecting and is of sensitive nature, the second or third option should be used as a best
practice. Authenticating users should be a practice to prevent access to sensitive data.
Search WWH ::




Custom Search