O'Reilly logo

.NET Framework Security by Kevin T. Price, Rudi Martin, Matthew Lyons, Sebastian Lange, Brian A. LaMacchia

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How Permissions Are Used

Now that we've explored the different types of permissions, it is important to understand how they are used by the .NET Framework. There are several ways in which permissions are utilized. They can be

  • Granted by the security policy

  • Demanded by .NET assemblies

  • Used for other security actions

Permissions and Security Policy

Chapter 5, “Evidence: Knowing Where Code Comes From,” covered evidence and the authentication model for .NET assemblies. Moving from authentication to authorization requires an understanding of security policy. Chapter 8, “Membership Conditions, Code Groups, and Policy Levels: The Brick and Mortar of Security Policy,” will cover security policy and permissions in fine detail, but this section provides ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required