COM Versus DCOM Security

This chapter examines how to work with COM+ security in order to allow and deny access to a COM+ server. I'm covering plain vanilla COM security in this chapter because it's an important topic to master before some of the distributed topics are addressed (especially MTS and Transactions). Later, in chapter 18, "COM+ Security," the COM+-specific security issues are covered.

Before the release of DCOM, object security was not an important issue. Because objects could not access objects across the network, you only had to worry about objects on the same machine. Controlling objects on one machine is fairly easy, but managing them across a 200-workstation network is slightly more difficult than rocket science, unless you ...

Get COM+ Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.