Summary

In this chapter you learned how to extract the security configuration of each object, building on what you learned in the preceding chapter. You also learned how to use ADO to search a directory for a specific object that you don't know the path of. Finally, you got to see a good portion of this in action by building an application that traversed the entire Active Directory tree, allowing you to examine every object in the tree.

In the next chapter, you'll learn about COM+ and how its security model works. You'll learn how it is the same—and how it's different—from the security model used in previous versions of Microsoft's Transaction Server.

Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.