473,804 Members | 3,686 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Runtime Security Policy Question

SD
Hi,

I have an assembly (.exe) started at logon of each computer of my company
and for each user. (Through PDC scripts)

This assembly use web services in order to request any informations.

When my exe is executed, i have this exception :
_______________ _______________ _______________ _______________ _____
Échec de la demande pour une autorisation de type System.Net.WebP ermission,
Syst
em, Version=1.0.500 0.0, Culture=neutral , PublicKeyToken= b77a5c561934e08 9.
mscorlib
at System.Security .CodeAccessSecu rityEngine.Chec kHelper(Permiss ionSet
granted
Set, PermissionSet deniedSet, CodeAccessPermi ssion demand, PermissionToken
permT
oken)

at System.Security .CodeAccessSecu rityEngine.Chec k(PermissionTok en
permToken,
CodeAccessPermi ssion demand, StackCrawlMark& stackMark, Int32 checkFrames,
Int32
unrestrictedOve rride)

at System.Security .CodeAccessSecu rityEngine.Chec k(CodeAccessPer mission
cap, S
tackCrawlMark& stackMark)

at System.Security .CodeAccessPerm ission.Demand()

at System.Net.Http RequestCreator. Create(Uri Uri)

at System.Net.WebR equest.Create(U ri requestUri, Boolean useUriBase)

at System.Net.WebR equest.Create(U ri requestUri)

at System.Web.Serv ices.Protocols. WebClientProtoc ol.GetWebReques t(Uri uri)

at System.Web.Serv ices.Protocols. HttpWebClientPr otocol.GetWebRe quest(Uri
uri)

at System.Web.Serv ices.Protocols. SoapHttpClientP rotocol.GetWebR equest(Uri
uri)

at System.Web.Serv ices.Protocols. SoapHttpClientP rotocol.Invoke( String
methodName, Object[] parameters)

at ManageWebFolder s.Webs.Webs.Get AllSubWebCollec tion()

at
ACFCIHexagone.M anageWebFolders .ManageWebFolde rs.GetWebCollec tion(String
sUrl, Hashtable ht)

at ACFCIHexagone.M anageWebFolders .ManageWebFolde rs.Main(String[] args)
_______________ _______________ _______________ _______________ _____
I understand it's a code access security pb but i don't know how to
configure my assembly to be authorized to run under my domain.

Need help please

Thanks

SD
Sep 18 '06 #1
0 1039

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
2192
by: Rob Barnes | last post by:
When I try to create a machine-level security policy based on an assembly's strong name, I get the following error: "ERROR: Invalid label or name" The caspol command is: "caspol -machine -addgroup All_Code -strong -file \\<network_share>\app.exe -noversion"
0
383
by: Jack | last post by:
I am working on a dotnet project to write an application that can audit and write registry and local security policy entries on multiple standalone (not networked) and domain computers. Since standalone machines are involved, Active Directory and group policy may or may not be a factor, so I must assume entries are not inherited from the domain group policy. So, my question is, how can I gain access to the computer configuration settings...
14
4193
by: wolftor | last post by:
1) Is there a free runtime version of Access available that is more recent than the one for Access 2000? 2) If I create an application (MDE) in A2K, will it run on all later versions of Access? 3) If I create a CD using A2K Developer that includes the runtime version of Access 2K and an installation package, and if someone tries to install the application from the CD, what happens if someone already has Access 2000 or a later version...
0
2099
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to allow it ro run then it will execute, the code execution depends on the permission provided to the assembly. If the code is not trusted wnough to run or it attempts to perform an action which doe not have the required permissions then its execution...
5
3206
by: Markus Stehle | last post by:
Hi all! I have asp.net web application that uses static impersonation. Is it possible to change the impersonated user during runtime? Within some parts of my application I would like to impersonate another user in order to access certain ressources and then switch back to the originally impersonated user. How can I do this? Thanks
16
2129
by: Marina | last post by:
Hi, I am trying to find the minimum security settings to allow a windows control embedded in IE have full trust. If I give the entire Intranet zone full trust, this works. However, this is very broad and gives the entire zone high privleges. I tried giving just the assembly full trust (using the full URL for the DLL), but this doesn't seem to work.
5
2066
by: Norsoft | last post by:
I have a .Net 1.1 application which is downloaded into an aspx page. It is a dll which inherits from System.Windows.Forms.UserControl. It works fine on a PC with only the 1.1 Framework. However, the control will not load on a PC with the 2.0 Framework installed. I know that IE will use the newest framework so I assume it is a security issue. At the assembly level I apply the following attributes;
5
8343
by: Henry Stock | last post by:
I am trying to understand the following error: Any thing you can tell me about this is appreciated. Security Exception Description: The application attempted to perform an operation not allowed by the security policy. To grant this application the required permission please contact your system administrator or change the application's trust level in the configuration file. Exception Details: for the permission of type
3
1345
by: =?Utf-8?B?SmFtZXMgV29uZw==?= | last post by:
Hi everybody, I'm facing a problem to run an appliation in a shared network drive. The application is developed in VB2005. I understand I have to add a signature with strong name key to all assambies. I found that I have to modify security policy to trust strong names. I want to clarify the followings: 1. Does it mean I have to modify the security policy for each client machine which runs my application in network drive?
0
9706
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9582
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10335
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
10082
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9157
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
5525
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4301
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3821
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2993
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.