To use code access security effectively, you need to know the basics such as the terminology and how policy is evaluated. For further background information about code access security, see the Additional Resources section at the end of this chapter. If you are already familiar with code access security, you may want to skip this section and go to the APTCA (AllowPartiallyTrustedCallersAttribute) section later in this chapter.
Code access security consists of the following elements:
All managed code is subject to code access security. When an assembly is loaded, it is granted a set of code access permissions that determines what resource types it can access and what types ...