In this chapter, we take a deeper look at security. We elaborate on the basics introduced in the previous chapters and explore some additional topics we have not yet mentioned.
The first part of the chapter is dedicated to binding and the security context. This is by far one of the most important concepts to understand, as it affects everything we try to do. It is also the primary reason why code fails to perform as expected and is quite often the first thing to investigate when troubleshooting.
The second part of the chapter deals with security settings on individual objects and applies to Active Directory and ADAM. Both Active Directory and ADAM use the standard Windows security descriptor model for securing objects and take advantage of the directory hierarchy to harness the inheritance model supported by security descriptors, much like the Windows file system or registry does. Active Directory and ADAM support security settings all the way down to individual attributes on objects, and we will discuss how to program this model using .NET with version 2.0 and the earlier 1.x release.
Finally, we take a brief but important look at code access security (CAS) and the notion of partially trusted code. This aspect of the .NET security model is often ignored and is not well understood by most developers, but it is critically important at least to know the basics, especially when programming in a partially trusted environment. As Windows itself matures, partial trust scenarios will become increasingly common. We discuss how System.DirectoryServices (SDS) and System.DirectoryServices.ActiveDirectory (SDS.AD) play in this space.
Part I: Fundamentals
Introduction to LDAP and Active Directory
Introduction to .NET Directory Services Programming
Binding and CRUD Operations with DirectoryEntry
Searching with the DirectorySearcher
Advanced LDAP Searches
Reading and Writing LDAP Attributes
Active Directory and ADAM Schema
Security in Directory Services Programming
Introduction to the ActiveDirectory Namespace
Part II: Practical Applications
User Management
Group Management
Authentication
Part III: Appendixes
Appendix A. Three Approaches to COM Interop with ADSI
Appendix B. LDAP Tools for Programmers
Appendix C. Troubleshooting and Help
Index