
598 Chapter 12 • Security
What you have to keep in mind is that we only discussed how the actual per-
mission set is determined at the user security policy level.This will be intersected
with the actual permission set determined on the machine level.And because at
the machine level the assembly will be given only the Internet permission set,
our signed assembly will wind up with the effective permission set of Internet.
Normally, the actual permission set of the enterprise is also taken into the inter-
section, but because that code group tree has only the All_Code code group with
full trust, it will play no role in the intersection of this example ...