Nota
L-aċċess għal din il-paġna jeħtieġ l-awtorizzazzjoni. Tista’ tipprova tidħol jew tibdel id-direttorji.
L-aċċess għal din il-paġna jeħtieġ l-awtorizzazzjoni. Tista’ tipprova tibdel id-direttorji.
Several values affect security for COM applications, including authentication level, impersonation level, cloaking, application identity, software restriction policy configuration, and reference tracking.
For more information, see the following topics:
- Authentication Level describes how to help control the amount of protection for communication between COM objects.
- Delegation and Impersonation explains how cloaking affects the identity presented to the server during impersonation and how the client grants the server the authority to act on its behalf.
- Application Identity identifies and explains the identities your application can use.
- Software Restriction Policy explains how to help protect your system from the dangers associated with running unknown code.
- Reference Tracking explains how you can ensure that objects are not released too early.
Related topics