Previous Page
Next Page

Conclusion

That was a lot of information; security administration can be complex. The key takeaways from this chapter include the following:

  • VSTO customization code will not run under the "out-of-the-box" security policy. Some additional policy must be applied that allows customizations to run. Choose your enterprise's security policies carefully.

  • The AppDomain policy level will not consider zone-based evidence for the customization assembly.

  • Both the customization and the document location must be fully trusted; there is no partial-trust scenario for calling the Word and Excel object models.

  • Strong names and publisher certificates use similar technology but solve slightly different problems. It is possible to use both forms of evidence in the same assembly.

  • A document that is opened from an intranet or Internet location must have additional policy to trust the document location; this policy is created using the Office Document Membership Condition.


Previous Page
Next Page