April 2024
Intermediate to advanced
608 pages
17h 13m
English

We’ve covered the first two components of the SRM: the security access token and the security descriptor. Now we’ll define its final component: the access check process, which accepts the token and the security descriptor and applies a fixed set of rules to determine whether an application can access a resource.
We’ll start by discussing the APIs you can call to perform an access check. Then we’ll take a deep dive into the implementation of the access check inside the Windows kernel, detailing how this check processes the different parts of the security descriptor and Token object to generate a final granted access ...