April 2002
Intermediate to advanced
816 pages
20h 56m
English
Now that we've explored the different types of permissions, it is important to understand how they are used by the .NET Framework. There are several ways in which permissions are utilized. They can be
Granted by the security policy
Demanded by .NET assemblies
Used for other security actions
Chapter 5, “Evidence: Knowing Where Code Comes From,” covered evidence and the authentication model for .NET assemblies. Moving from authentication to authorization requires an understanding of security policy. Chapter 8, “Membership Conditions, Code Groups, and Policy Levels: The Brick and Mortar of Security Policy,” will cover security policy and permissions in fine detail, but this section provides ...