11Security and Deployment

The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.


Topics Covered in This Chapter

VSTO Security Model

Deploying Word and Excel Solutions

Deploying Outlook Solutions


Review Questions

VSTO Security Model

VSTO makes it easy for you to create great Office solutions. Of course, after you have completed your solution, you must deploy it to end users in a secure, maintainable way. VSTO has a powerful, flexible security model that is built on top of .NET code access security, giving you control over which code you allow to run on your machine.

One of the key security design principles of VSTO is that it is secure by default. ...

Get VSTO for Mere Mortals™: A VBA Developer’s Guide to Microsoft Office Development Using Visual Studio 2005 Tools for Office now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.