Summary

This chapter has presented you with a lot of information about code access security. You've seen the underlying structure of how permissions work, what permissions and permission sets are, and what CAS is. The discussion moved to learning how to administer and configure CAS as well as to create deployment packages to accommodate the needs of your own application. Finally, you saw a sample of CAS in action in the appearance of a class that can be used only by classes written by the same publisher with the same public key. At this point, you should have a thorough understanding of CAS—you will not take its existence for granted the next time you set out to create a new project.

Get Microsoft® Visual C#® .NET 2003 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.