Managing Users in Roles
Most administration tasks for configuring COM+ application security involve populating predefined roles with users, both when installing applications and on an ongoing basis. For introductory information about how these security features work, see Configuring Role-Based Security.
In this section, step-by-step instructions are provided for the following tasks:
- Enabling Role-Based Authorization Checking
- Assigning a User Account or Group to a Role
- Removing a User Account or Group from a Role
- Moving a User Account or Group to a Different Role