O'Reilly logo

Managing Data and Media in Microsoft Silverlight 4: A mashup of chapters from Packt's bestselling Silverlight books by Todd Snyder, Kevin Dockx, Gill Cleeren, Gastón C. Hillar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding network security

Silverlight uses a security policy-based approach for allowing cross-domain access. Depending on how you have configured your Silverlight application and the location of the resource (File or Web Service) you are trying to access, Silverlight will download and verify that your application (Host Domain) can access the resource. If you are running an out-browser Silverlight application with evaluated trust or accessing a resource on the same host domain (and port) as your Silverlight XAP file, the policy file is not required.

The following image shows the different rules that Silverlight uses for deterring when to download and verify the cross-domain policy file. For resources on the same domain, the file is not required. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required