{"id":43473,"date":"2016-09-29T10:00:28","date_gmt":"2016-09-29T08:00:28","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/nav\/?p=12955"},"modified":"2024-03-05T11:40:50","modified_gmt":"2024-03-05T19:40:50","slug":"design-pattern-security-single-point-of-access","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/dynamics-365\/blog\/business-leader\/2016\/09\/29\/design-pattern-security-single-point-of-access\/","title":{"rendered":"Design Pattern: Security – Single Point of Access"},"content":{"rendered":"

\"<\/a>
\n<\/em><\/p>\n

Context<\/b>: Protected data needs to be used. There are many types of entities which might attempt to use the data.<\/p>\n

Problem<\/b>: If no standard way of accessing data exists, then each entity might attempt to build its own system for handing the sensitive data. The data access layer might be implemented over and over again by each entity, without reuse of known best practices and with a lot of code duplication.<\/p>\n

Forces:<\/b><\/p>\n