11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How To:Use Code Access <strong>Security</strong> Policyto Constrain an AssemblyApplies ToThis information applies to server or workstation computers that run the following:● Microsoft ® Windows ® 2000 Server <strong>and</strong> the Windows 2000 Professional,Windows Server 2003, Windows XP Professional operating systems● Microsoft .NET Framework version 1.1SummaryAn administrator can configure code access security policy to constrain theoperations of .NET Framework code (assemblies.) In this How To, you configure codeaccess security policy to constrain the ability of an assembly to perform file I/O <strong>and</strong>restrict file I/O to a specific directory.You use the.NET Framework 1.1 Configuration tool to create a new permission set<strong>and</strong> a new code group. The permission set defines what the code can <strong>and</strong> cannot do,<strong>and</strong> the code group associates the permission set with particular code, for example aspecific assembly or set of assemblies.In addition to constraining file I/O, you can use code access security policy to imposeother constraints on code. For example, you can restrict the ability of code to accessother types of resources protected by code access security, including databases,directory services, event log, registry, Domain Name System (DNS) servers,unmanaged code, <strong>and</strong> environment variables.Note This list is not exhaustive but represents many of the common resource types accessed by<strong>Web</strong> applications.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!