Team LiB
Previous Section Next Section

Summary

This chapter has presented you with a lot of information about code access security. You've seen the underlying structure of how permissions work, what permissions and permission sets are, and what CAS is. The discussion moved to learning how to administer and configure CAS as well as to create deployment packages to accommodate the needs of your own application. Finally, you saw a sample of CAS in action in the appearance of a class that can be used only by classes written by the same publisher with the same public key. At this point, you should have a thorough understanding of CASyou will not take its existence for granted the next time you set out to create a new project.

    Team LiB
    Previous Section Next Section