Summary

In this chapter you learned how to extract the security configuration of each object, building on what you learned in the preceding chapter. You also learned how to use ADO to search a directory for a specific object that you don't know the path of. Finally, you got to see a good portion of this in action by building an application that traversed the entire Active Directory tree, allowing you to examine every object in the tree.

In the next chapter, you'll learn about COM+ and how its security model works. You'll learn how it is the same—and how it's different—from the security model used in previous versions of Microsoft's Transaction Server.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset