Summary


In this chapter, you have learned about the concepts relevant to Code Access Security and have seen how the Code Access Security paradigm fits within the Trustworthy Computing initiative. You have learned about the difference between Identity-Based Security and Code Access Security. The chapter explains the basic building blocks that are important in Code Access Security, such as permissions, named permission sets, evidence, code groups, membership conditions, stack walk modifiers and security demands. You have also learned how to read and create SharePoint Server 2007 security policy files. Then the chapter discussed what partially trusted callers and APTCA are. The chapter concluded with an explanation of how to use Visual Studio 2005 to calculate the required security permissions for .NET assemblies.




Microsoft Office Sharepoint Server 2007 Administrator's Companion
MicrosoftВ® Office SharePointВ® Server 2007 Administrators Companion
ISBN: 0735622825
EAN: 2147483647
Year: 2004
Pages: 299

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net