13.07.2015 Views

[MS-DFSRH]: DFS Replication Helper Protocol Specification

[MS-DFSRH]: DFS Replication Helper Protocol Specification

[MS-DFSRH]: DFS Replication Helper Protocol Specification

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5 SecurityAll security considerations that apply to DCOM interfaces, as specified in [<strong>MS</strong>-DCOM] section 5, arealso applicable to the <strong>DFS</strong>-R <strong>Helper</strong> <strong>Protocol</strong>.In addition, the IADProxy and IADProxy2 interfaces expose methods for changing ActiveDirectory configuration objects. These configuration objects SHOULD have restricted access, asspecified in section 1.3. Before processing the methods of IADProxy and IADProxy2, animplementation of the <strong>DFS</strong>-R <strong>Helper</strong> <strong>Protocol</strong> SHOULD verify the identity of the caller and verify thatthe caller has privileges to change these objects. The details of this check are implementationspecificand depend on the security model of the implementation.[<strong>MS</strong>-<strong><strong>DFS</strong>RH</strong>] – v20080207<strong>DFS</strong> <strong>Replication</strong> <strong>Helper</strong> <strong>Protocol</strong> <strong>Specification</strong>Copyright © 2008 Microsoft Corporation.Release: Thursday, February 7, 200871 / 81

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!