Skip to content

Commit ceb49b2

Browse files
authored
Fixed formatting
1 parent 26d8817 commit ceb49b2

File tree

1 file changed

+14
-14
lines changed
  • samples/features/security/contoso-clinic

1 file changed

+14
-14
lines changed

samples/features/security/contoso-clinic/README.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,33 +1,33 @@
1-
#Contoso Clinic Demo Application
1+
# Contoso Clinic Demo Application
22

33
Sample application with database that showcases security features of SQL Server 2016.
44

55
## About this sample
6-
- **Applies to:** SQL Database 2016
6+
- **Applies to:** SQL Server 2016
77
- **Programming Language:** .NET C#, T-SQL
88
- **Authors:** Jakub Szymaszek [jaszymas-MSFT]
99

1010
This project has adopted the [Microsoft Open Source Code of Conduct](http://microsoft.github.io/codeofconduct). For more information see the [Code of Conduct FAQ](http://microsoft.github.io/codeofconduct/faq.md) or contact [[email protected]](mailto:[email protected]) with any additional questions or comments.
1111

12-
##Contents
13-
1. [Prerequisites] (#prerequisites)
14-
2. [Setup] (#setup)
12+
## Contents
13+
1. [Prerequisites](#prerequisites)
14+
2. [Setup](#setup)
1515
* Set up the Demo Database
1616
* Modify the Sample Application
17-
4. [SQL 2016 Security Features in this demo] (#sql-2016-security-features-in-this-demo)
17+
4. [SQL 2016 Security Features in this demo](#sql-2016-security-features-in-this-demo)
1818
* Always Encrypted
1919
* Row Level Security
2020
* Dynamic Data Masking
21-
5. [Application Notes] (#application-notes)
21+
5. [Application Notes](#application-notes)
2222

2323

2424

25-
##Prerequisites
25+
## Prerequisites
2626
1. Visual Studio 2015 (or newer)
2727
2. [SQL Server 2016](https://www.microsoft.com/en-us/evalcenter/evaluate-sql-server-2016)
2828
3. [SQL Server Management Studio](https://msdn.microsoft.com/en-us/library/mt238290.aspx)
2929

30-
##Setup
30+
## Setup
3131
### Set up the Demo Database
3232
1. Clone/Download the repository
3333
2. Import the *Clinic* database
@@ -75,7 +75,7 @@ This project has adopted the [Microsoft Open Source Code of Conduct](http://micr
7575

7676
## SQL 2016 Security Features in this Demo
7777
### Always Encrypted
78-
####Enable Always Encrypted
78+
#### Enable Always Encrypted
7979
+ Connect to your database using SSMS:
8080
- For more information on using SSMS to connect to a Database, [click here](https://azure.microsoft.com/en-us/documentation/articles/sql-database-connect-query-ssms/)
8181
+ Encrypt Sensitive Data Columns using the Column Encryption Wizard
@@ -114,16 +114,16 @@ This project has adopted the [Microsoft Open Source Code of Conduct](http://micr
114114
- Run the ContosoClinic application from Visual Studio (by hitting *F5* OR select *Debug* > *Start Debugging*)
115115
- Click on the *Patients* tab. You should see a list of patients again.
116116

117-
####How did that work?
117+
#### How did that work?
118118
##### Connection String
119119
Our connection string for our application now contains `Column Encryption Setting=Enabled` which instructs the driver to automatically encrypt parameters targeting encrypted columns and decrypt any results retrieved from encrypted columns, without code changes. Don't forget this for your app if you intend to use Always Encrypted functonality. For more information this feature, [see our blog](https://blogs.msdn.microsoft.com/sqlsecurity/2016/07/11/always-encrypted-in-azure-sql-database-is-generally-available/).
120120

121121
### Row Level Security (RLS)
122122

123-
####Login to the application
123+
#### Login to the application
124124
Sign in using ([email protected]/Password1!) or ([email protected]/Password1!)
125125

126-
####Enable Row Level Security (RLS)
126+
#### Enable Row Level Security (RLS)
127127
+ Connect to your database using SSMS:
128128
[Instructions](https://azure.microsoft.com/en-us/documentation/articles/sql-database-connect-query-ssms/)
129129
+ Open Enable-RLS.sql ( [Find it here](tsql-scripts/Enable-RLS.sql))
@@ -132,7 +132,7 @@ Sign in using ([email protected]/Password1!) or ([email protected]/Password1!)
132132

133133
#### How did that work?
134134

135-
#####The application leverages an Entity Framework feature called **interceptors**
135+
##### The application leverages an Entity Framework feature called **interceptors**
136136
Specifically, we used a `DbConnectionInterceptor`. The `Opened()` function is called whenever Entity Framework opens a connection and we set SESSION_CONTEXT with the current application `UserId` there.
137137

138138
##### Predicate functions

0 commit comments

Comments
 (0)