Summary

This chapter discussed Windows 2000 security, including both the traditional low-level security structures and functions and the newer trustee-based access control functions offered by Windows 2000. This chapter also included an example of how a server can use impersonation to properly handle access requests from a client.

The next chapter looks at the other side of this coin—the authentication of a user. Through the combination of these two topics, you can provide a server object that logs a user in and then uses that user's access token to limit that user's access on the server.

Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.