/// <summary> /// TTMSs the groups delete dal. /// </summary> /// <param name="_ObjTMS_Groups">The object TMS groups.</param> /// <returns>System.Int32.</returns> public int TTMS_Groups_DeleteDAL(SecurityGroups _ObjTMS_Groups) { return(ExecuteScalarInt32Sp("TMS_Groups_Delete", ParamBuilder.Par("GroupId", _ObjTMS_Groups.GroupId), ParamBuilder.Par("UpdatedBy", _ObjTMS_Groups.UpdatedBy), ParamBuilder.Par("UpdatedDate", _ObjTMS_Groups.UpdatedDate))); }
/// <summary> /// Creates an instance of <see cref="SecurityUserControl"/> class. /// </summary> public SecurityUserControl() { InitializeComponent(); m_userAccounts = new UserAccounts(1, false); m_securityGroups = new SecurityGroups(1, false); m_applicationRoles = new ApplicationRoles(1, true); RefreshBindings(); this.Unloaded += new RoutedEventHandler(SecurityUserControl_Unloaded); m_userAccounts.BeforeSave += new System.ComponentModel.CancelEventHandler(m_userAccounts_BeforeSave); m_userAccounts.Saved += new System.EventHandler(m_userAccounts_Changed); m_userAccounts.Deleted += new System.EventHandler(m_userAccounts_Changed); m_securityGroups.Saved += new System.EventHandler(m_securityGroups_Changed); m_securityGroups.Deleted += new System.EventHandler(m_securityGroups_Changed); m_invalidPasswordMessage = new StringBuilder(); m_invalidPasswordMessage.Append("Password does not meet the following criteria:"); m_invalidPasswordMessage.AppendLine(); m_invalidPasswordMessage.Append("- Password must be at least 8 characters"); m_invalidPasswordMessage.AppendLine(); m_invalidPasswordMessage.Append("- Password must contain at least 1 digit"); m_invalidPasswordMessage.AppendLine(); m_invalidPasswordMessage.Append("- Password must contain at least 1 upper case letter"); m_invalidPasswordMessage.AppendLine(); m_invalidPasswordMessage.Append("- Password must contain at least 1 lower case letter"); }
private void m_userAccounts_Changed(object sender, EventArgs e) { TextBoxPassword.Password = string.Empty; m_securityGroups = new SecurityGroups(1, false); m_applicationRoles = new ApplicationRoles(1, true); RefreshBindings(); }
private void ClientOnGetAllSecurityGroupsCompleted(object sender, GetAllSecurityGroupsCompletedEventArgs e) { if (!e.Result.HasError) { foreach (var pair in e.Result.Result) { SecurityGroups.Add(PermissionLevel.Convert(pair.Key), pair.Value); } foreach (var valuePair in SecurityGroups) { foreach (var item in valuePair.Value) { if (AllSecurityGroups.All(q => q.GroupId != item.GroupId)) { AllSecurityGroups.Add(item); } } } MapManager.QueryDomainsCompleted.RegisterEvent(OnAcquireDomainsCompleted); MapManager.QueryDomainsAsync(); } else { SuperMessageBoxService.ShowError("Error Occurred", "An error occurred while retrieving the groups with Glyma permissions.", Close); } }
/// <summary> /// TMSs the groups update dal. /// </summary> /// <param name="_ObjTMS_Groups">The object TMS groups.</param> /// <returns>System.Int32.</returns> public int TMS_Groups_UpdateDAL(SecurityGroups _ObjTMS_Groups) { return(ExecuteScalarInt32Sp("TMS_Groups_Update", ParamBuilder.Par("GroupId", _ObjTMS_Groups.GroupId), ParamBuilder.Par("PrimaryGroupName", _ObjTMS_Groups.PrimaryGroupName), ParamBuilder.Par("SecondaryGroupName", _ObjTMS_Groups.SecondaryGroupName), ParamBuilder.Par("IsDeleteAllowed", _ObjTMS_Groups.IsDeleteAllowed), ParamBuilder.Par("UpdatedBy", _ObjTMS_Groups.UpdatedBy), ParamBuilder.Par("UpdatedDate", _ObjTMS_Groups.UpdatedDate))); }
/// <summary> /// TMSs the groups create dal. /// </summary> /// <param name="_ObjTMS_Groups">The object TMS groups.</param> /// <returns>System.Int64.</returns> public long TMS_Groups_CreateDAL(SecurityGroups _ObjTMS_Groups) { var parameters = new[] { ParamBuilder.Par("ID", 0) }; return(ExecuteInt64withOutPutparameterSp("TMS_Groups_Create", parameters, ParamBuilder.Par("PrimaryGroupName", _ObjTMS_Groups.PrimaryGroupName), ParamBuilder.Par("SecondaryGroupName", _ObjTMS_Groups.SecondaryGroupName), ParamBuilder.Par("IsDeleteAllowed", _ObjTMS_Groups.IsDeleteAllowed), ParamBuilder.Par("OrganizationID", _ObjTMS_Groups.OrganizationID), ParamBuilder.Par("CreatedBy", _ObjTMS_Groups.CreatedBy), ParamBuilder.Par("CreatedDate", _ObjTMS_Groups.CreatedDate))); }
// [ActivityAuthorize] public JsonResult Groups_Destroy_Verify(long _objGroupsID) { SecurityGroups _objGroups = new SecurityGroups(); _objGroups.GroupId = _objGroupsID; if (_objGroupsID == 1 || _objGroupsID == 20008) { return(Json(false, JsonRequestBehavior.AllowGet)); } else if (_Groups.IsDeletedAllow(_objGroups) > 0) { return(Json(false, JsonRequestBehavior.AllowGet)); } else { return(Json(true, JsonRequestBehavior.AllowGet)); } }
private void SecurityUserControl_Unloaded(object sender, RoutedEventArgs e) { try { if (m_userAccounts != null) { m_userAccounts.BeforeSave -= m_userAccounts_BeforeSave; m_userAccounts.Saved -= m_userAccounts_Changed; m_userAccounts.Deleted -= m_userAccounts_Changed; } if (m_securityGroups != null) { m_securityGroups.Saved -= m_securityGroups_Changed; m_securityGroups.Deleted -= m_securityGroups_Changed; } } finally { m_userAccounts = null; m_securityGroups = null; m_applicationRoles = null; } }
/// <summary> /// Creates an instance of <see cref="SecurityUserControl"/> class. /// </summary> public SecurityUserControl() { ConfigurationFile config; CategorizedSettingsElementCollection settings; InitializeComponent(); config = ConfigurationFile.Current; settings = config.Settings["securityProvider"]; // Set up defaults for config file settings m_passwordRequirementsRegex = AdoSecurityProvider.DefaultPasswordRequirementsRegex; m_passwordRequirementsError = AdoSecurityProvider.DefaultPasswordRequirementsError; // Make sure default config file settings exist settings.Add("PasswordRequirementsRegex", m_passwordRequirementsRegex, "Regular expression used to validate new passwords for database users."); settings.Add("PasswordRequirementsError", m_passwordRequirementsError, "Error message to be displayed when new database user password fails regular expression test."); // Read settings from config file m_passwordRequirementsRegex = settings["PasswordRequirementsRegex"].ValueAs(m_passwordRequirementsRegex); m_passwordRequirementsError = settings["PasswordRequirementsError"].ValueAs(m_passwordRequirementsError); // Initialize view models m_userAccounts = new UserAccounts(1, false); m_securityGroups = new SecurityGroups(1, false); m_applicationRoles = new ApplicationRoles(1, true); RefreshBindings(); // Attach to events Unloaded += SecurityUserControl_Unloaded; m_userAccounts.BeforeSave += m_userAccounts_BeforeSave; m_userAccounts.Saved += m_userAccounts_Changed; m_userAccounts.Deleted += m_userAccounts_Changed; m_securityGroups.Saved += m_securityGroups_Changed; m_securityGroups.Deleted += m_securityGroups_Changed; }
/// <summary> /// TMSs the groups create bal. /// </summary> /// <param name="_ObjTMS_Groups">The object TMS groups.</param> /// <returns>System.Int64.</returns> public long TMS_Groups_CreateBAL(SecurityGroups _ObjTMS_Groups) { return(_DAL.TMS_Groups_CreateDAL(_ObjTMS_Groups)); }
public int IsDeletedAllow(SecurityGroups _ObjTMS_Groups) { return(_DAL.IsDeletedAllowDAL(_ObjTMS_Groups)); }
/// <summary> /// TMSs the groups delete bal. /// </summary> /// <param name="_ObjTMS_Groups">The object TMS groups.</param> /// <returns>System.Int32.</returns> public int TMS_Groups_DeleteBAL(SecurityGroups _ObjTMS_Groups) { return(_DAL.TTMS_Groups_DeleteDAL(_ObjTMS_Groups)); }
/// <summary> /// TMSs the groups update bal. /// </summary> /// <param name="_ObjTMS_Groups">The object TMS groups.</param> /// <returns>System.Int32.</returns> public int TMS_Groups_UpdateBAL(SecurityGroups _ObjTMS_Groups) { return(_DAL.TMS_Groups_UpdateDAL(_ObjTMS_Groups)); }
public int IsDeletedAllowDAL(SecurityGroups _ObjTMS_Groups) { return(ExecuteScalarInt32Sp("TMS_Groups_IsDeleteAllow", ParamBuilder.Par("GroupId", _ObjTMS_Groups.GroupId))); }
private void m_userAccounts_Changed(object sender, System.EventArgs e) { TextBoxPassword.Password = string.Empty; m_securityGroups = new SecurityGroups(1, false); m_applicationRoles = new ApplicationRoles(1, true); RefreshBindings(); }
public ActionResult Groups_Destroy([DataSourceRequest] DataSourceRequest request, SecurityGroups _objGroups) { if (_Groups.IsDeletedAllow(_objGroups) > 0) { return(Json(lr.UserEmailAlreadyExist, JsonRequestBehavior.AllowGet)); } else { if (ModelState.IsValid) { if (_objGroups.GroupId <= 3) { } else { _objGroups.UpdatedBy = CurrentUser.NameIdentifierInt64; _objGroups.UpdatedDate = DateTime.Now; var result = _Groups.TMS_Groups_DeleteBAL(_objGroups); if (result == -1) { ModelState.AddModelError(lr.ErrorServerError, lr.ResourceUpdateValidationError); } } } var resultData = new[] { _objGroups }; return(Json(resultData.AsQueryable().ToDataSourceResult(request, ModelState))); } }
public ActionResult Groups_Update([DataSourceRequest] DataSourceRequest request, SecurityGroups _objGroups) { if (ModelState.IsValid) { _objGroups.UpdatedBy = CurrentUser.NameIdentifierInt64; _objGroups.UpdatedDate = DateTime.Now; var result = _Groups.TMS_Groups_UpdateBAL(_objGroups); if (result == -1) { ModelState.AddModelError(lr.ErrorServerError, lr.ResourceUpdateValidationError); } } var resultData = new[] { _objGroups }; return(Json(resultData.AsQueryable().ToDataSourceResult(request, ModelState))); }
public ActionResult Groups_Create([DataSourceRequest] DataSourceRequest request, SecurityGroups _objGroups) { if (ModelState.IsValid) { _objGroups.CreatedBy = CurrentUser.NameIdentifierInt64; _objGroups.CreatedDate = DateTime.Now; _objGroups.OrganizationID = CurrentUser.CompanyID; _objGroups.AddedByAlias = CurrentUser.Name; _objGroups.GroupId = _Groups.TMS_Groups_CreateBAL(_objGroups);//.PersonEmailAddress_CreateBAL(_objGroups); //ModelState.AddModelError(lr.ErrorServerError, lr.ResourceUpdateValidationError); } var resultData = new[] { _objGroups }; return(Json(resultData.ToDataSourceResult(request, ModelState))); }