Code Access Security in .NET 2.0
page 6 of 7
by Uday Denduluri
Feedback
Average Rating: This article has not yet been rated.
Views (Total / Last 10 Days): 30910/ 65

Configuring the Code Access security

We have been discussing a Permission Sets, Code group and Policy Level. Now, we will try to understand how an Administrator configures the code access security using .NET Framework configuration wizard. Figure 3 shows editing the Permission set to full trust. We have other options, such as Skip Verification, Execution, Local intranet, Internet and Nothing.

Figure 3

The figure given below shows the modification of Membership condition to all code. We have all the options listed with their meanings.

·         All Code –  all assemblies meet this condition

·         Application Directory – all assemblies in the directory or a child directory of running app

·         Hash – all assemblies with a hash that matches the given hash

·         Publisher – all assemblies digitally signed with a specified certificate

·         Site – all assemblies downloaded from a specified site

·         Strong Name – all assemblies with a specified strong name and public key

·         URL – all assemblies downloaded from a specified URL

·         Zone – all assemblies that originate from one of five specified zones listed below

·         My Computer – Internet, Local Intranet, Trusted Sites and Untrusted Sites

Figure 4


View Entire Article

User Comments

Title: Code Access Security in .NET 2.0   
Name: Developer
Date: 2008-01-09 4:36:06 PM
Comment:
Really good one....
Title: Code Access Security in .NET 2.0   
Name: Shakeer....
Date: 2007-06-01 12:50:07 AM
Comment:
Hi,

Good one...........

Product Spotlight
Product Spotlight 





Community Advice: ASP | SQL | XML | Regular Expressions | Windows


©Copyright 1998-2021 ASPAlliance.com  |  Page Processed at 2021-11-29 7:02:39 AM  AspAlliance Recent Articles RSS Feed
About ASPAlliance | Newsgroups | Advertise | Authors | Email Lists | Feedback | Link To Us | Privacy | Search