ITEC102PART2 Flashcards
Objects that represent specific authorizations
Permissions
Determines what code is permitted to do:
set of permissions to grant to an assembly
Policy
Inputs to policy about code, from multiple sources
Evidence
object represents a specific authorization, such as access to a resource
“permission to do something”
Permission
is an authorization given to an assembly (code)
“this code is authorized to do something”
Grant
is a security check for corresponding grants
“is something allowed?” (else, raise exception)
Demand
Permissions for Framework resources
• These permissions represent access to protected resources.
Standard .NET permissions
These permissions represent code identity. They are granted to code based on its corresponding evidence.
Identity permissions
A user identity permission is also supported. this is the only non-code access permission in the framework
Other permission
Most permissions are code access permissions ( true/ false )
True
Demanding a permission performs a _____ ______ checking for related grants of all callers
Stack walk
Modifiers provide fine-grained, dynamic control over state of grants on the stack
Stack Walk Modifiers
“I vouch for my callers; checks for perm can stop at this frame”
■ Example: “Gatekeeper” classes
Assertion
appropriate permission from caller
Demand
permission to call unmanaged code
Make the unmanaged call
Assert
Identity permissions allow the same security checks on identity of code
• Digital signature, location (URL, site), etc.
Controlling access to code
code reference by a caller
LinkDemand
It must be signed with the private key corresponding to the public key used in the previous example.
Calling code
is the process of determining the permissions to grant to code
• Permissions granted to code, not user
■ Grants are on a per-assembly basis
Policy
A policy level is a collection of
Code group
Read environment variables (limited), UI, IsolatedStorage, Assertion, Web access to same site, File read to same UNC directory
Intranet Zone
Safe UI, IsolatedStorage, Web access to same site
Internet Zone
Evidence-Based Security ( 3 )
Permission
Policy
Evidence
Two ways to make checks
Imperatively
Declaratively