O'Reilly logo

Sams Teach Yourself SharePoint® 2010 Development in 24 Hours by Vinu Santhakumari, Manpreet Singh, Sohail Sayed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Developing a Full Trust Proxy

Not all SharePoint solutions can fit within the boundary of a sandbox. You may have scenarios where you need to write a file to the disk, access databases, or web service. As discussed earlier you are restricted to performing these operations in custom code to be deployed as a sandboxed solution. In such cases, you can overcome these restrictions by developing a full trust proxy. Using a full trust proxy, your sandboxed code can make a call to a trusted assembly that is deployed as a farm solution. This assembly performs the restricted operation on behalf of your sandboxed code and returns the operation execution result.

You may be wondering what the benefit is of such a complicated approach to break the sandbox ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required