Items | Details |
---|---|
Authorization |
Select the Enforce access checks for this application check box to enforce role-based access checks for the application. When roles are defined for an application, a caller's role membership is checked on every call into the application. |
Security Level |
Click Perform access checks only at the process level to enable access checks only at the application level; no role checking is performed at the component, interface, or method levels. If the Enforce access checks for this application check box is not selected, this setting is ignored. Click Perform access checks at the process and component level to enable access checks at every level on calls into the application. Role checking is performed at the application level and at the component, interface, and method levels for any component that has Enforce component level access checks selected on its component properties Security tab. If the Enforce access checks for this application check box is not selected, this setting is ignored. |
Software Restriction Policy |
Select the Apply software restriction policy check box to configure the trust level of the software restriction policy for this application in the Restriction Level drop-down box. If the check box is not selected, the system-wide configuration of the software restriction policy is used. |
Authentication Level for Calls |
When you set an authentication level for an application, you determine what degree of authentication is performed when clients call into the application. Higher authentication levels provide greater security and integrity. The authentication level that you select takes effect the next time that the application is started. Select the appropriate authentication level. The following authentication levels are in order from lowest to highest:
|
Impersonation Level |
When you set an impersonation level for an application, you determine what degree of authority that the application grants other applications to use its identity when it calls them. You can set this impersonation level only for COM+ server applications. Library applications run under the identity of the hosting process, and they use the impersonation level that it specifies. Select the appropriate impersonation level. The following impersonation levels are in order from least authority granted to greatest authority granted:
|