COM+ Security Tasks

The following topics in this section provide step-by-step instructions for using COM+ security services.

Topic Description
Configuring Role-Based Security
Explains how to define roles for the application, assign them to resources, and enable access checking to be performed at various levels.
Managing Users in Roles
Explains how to populate predefined roles with users.
Setting an Authentication Level for a Server Application
Explains how to set an authentication level to administratively determine how authentication will be performed for a server application.
Enabling Authentication for a Library Application
Explains how to set an authentication level to administratively determine how authentication will be performed for a library application.
Setting an Impersonation Level
Explains how to grant an impersonation authority on calls made out of the application.
Configuring the Software Restriction Policy
Explains how to set the software restriction policy for COM+ applications.

COM+ Security Concepts