Role-Based Security Administration

Role-based security is an automatic service provided by COM+ that enables you to administratively construct and enforce an access control policy for your COM+ application. With a flexible and extensible security configuration model, role-based security offers a considerable advantage over enforcing all security within your components and provides the following benefits:

  • You can configure security administratively, using either the Component Services administrative tool or the Administrative functions.
  • You don't have to write security-related logic into your components when role protection at the method level provides you with fine enough access control.
  • You don't have to factor security into interface or component design. Instead, you can set security on a method-by-method basis.
  • You can focus on the structure of the security policy you want to enforce, and through roles, that policy can be clearly expressed to the administrators deploying your application.
  • You can easily modify a security policy to adapt to evolving security requirements for an application.
  • You can build more granular security policies programmatically if you need to, using role-based security as a supporting platform.
  • You can leverage role-based security to do detailed auditing, because you can obtain caller security information for an entire chain of upstream calls.

Note

Users in the Administrator role for the System Application must be members of the local administrators group. Also, as of Windows Server 2003, the authentication capability for the COM+ System Application includes the value EOAC_DISABLE_AAA. This value, which disables activate-as-activator (AAA) activations, is used in the CoInitializeSecurity call when launching the System Application. Setting the authentication capability to EOAC_DISABLE_AAA allows an application that runs under a privileged account (such as LocalSystem) to help prevent its identity from being used to launch untrusted components.

 

See the following topics in this section for information about how role-based security works and issues to consider when using it to construct a security policy for an application:

For detailed how-to descriptions of the steps involved in configuring role-based security for an application, see Configuring Role-Based Security.

Client Authentication

Client Impersonation and Delegation

Library Application Security

Multi-Tier Application Security

Programmatic Component Security

Using the Software Restriction Policy in COM+