Programming WCF Services
10.12. Scenarios Summary
Now that you have seen the making of the five key scenarios, Tables 10-9 and 10-10 serve as a summary of their key elements. Table 10-9 lists the bindings used in each scenario. Note again that while technically you could use other bindings in almost each scenario, my selection of the bindings is aligned with the context in which the scenario is used.
Table 10-10 shows how each of the security aspects defined at the beginning of this chapter (transfer security, service and client authentication, authorization, and impersonation) relates to each scenario.
|
Категории