COM+ Security Tasks
The following topics in this section provide step-by-step instructions for using COM+ security services.
Topic | Description |
---|---|
Configuring Role-Based Security |
Explains how to define roles for the application, assign them to resources, and enable access checking to be performed at various levels. |
Managing Users in Roles |
Explains how to populate predefined roles with users. |
Setting an Authentication Level for a Server Application |
Explains how to set an authentication level to administratively determine how authentication will be performed for a server application. |
Enabling Authentication for a Library Application |
Explains how to set an authentication level to administratively determine how authentication will be performed for a library application. |
Setting an Impersonation Level |
Explains how to grant an impersonation authority on calls made out of the application. |
Configuring the Software Restriction Policy |
Explains how to set the software restriction policy for COM+ applications. |