473,324 Members | 2,511 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,324 software developers and data experts.

Deploying strong-named app

Our application has three strong-named keys that have to be set up on the
local machines. Apparently the Framework can be pushed to the clients with
SMS, but I'm being told a human has to do things on the PCs to get handle the
keys.

Can it be automated? Is it feasible to have a link on a Web page a new user
could go to to get not just the Framework but these keys installed?
Oct 14 '05 #1
6 1450
Hi,

Do you mean you need to deploy the key or strong-named assemblies? Because
spreading the key is not secure. Anyone who gets the key can use the key to
sign their assembly. Also, we don't need to deploy keys when using an
application.

Kevin Yu
=======
"This posting is provided "AS IS" with no warranties, and confers no
rights."

Oct 15 '05 #2
We have several packages we use that are strong-named by their suppliers. In
order for someone to use these their .NET config apparently has to be "told"
the keys. We have run the config utility and it'll make an MSI, but then the
"target" machine gets all the settings from the source machine, not just the
ones we want to distribute; there is no option (I'm told) forgetting just
certain ones (ours). I understand what you're saying about the keys, but
that's the mechanism the vendors use to control their code; I think tthe keys
are "branded" for our implementations so you can't use them with another copy
of the vendor's code.

Suggestions?

"Kevin Yu [MSFT]" wrote:
Hi,

Do you mean you need to deploy the key or strong-named assemblies? Because
spreading the key is not secure. Anyone who gets the key can use the key to
sign their assembly. Also, we don't need to deploy keys when using an
application.

Kevin Yu
=======
"This posting is provided "AS IS" with no warranties, and confers no
rights."

Oct 17 '05 #3
NormD wrote:
We have several packages we use that are strong-named by their
suppliers.
Are you suggesting that the assemblies are signed so that they have a
striong name?
In order for someone to use these their .NET config
apparently has to be "told" the keys.
If the assmblies have a strong name you do *not* need to have access to
the keys. When you compile your assembly that uses one of those signed
assemblies the compiler extracts enough information (specifically, it
gets the publickeytoken derived from the public key in the signed
assembly) and places this in the resultant file.

Work through my Fusion workshop and you'll see what the keys are used
for.
ones (ours). I understand what you're saying about the keys, but
that's the mechanism the vendors use to control their code; I think
tthe keys are "branded" for our implementations so you can't use them
with another copy of the vendor's code.


The other thing that you might mean (your description is a little
confusing) is if the vendor assemblies have licenced controls and they
require some software key to be installed before the control will work
at runtime. If that is the case then it is not associated with the
strong name mechanism.

Richard
--
http://www.grimes.demon.co.uk/workshops/fusionWS.htm
http://www.grimes.demon.co.uk/workshops/securityWS.htm
Oct 17 '05 #4
Hi,

Yes, I agree with Richard, that the strong named assemblies contains their
own information on key(public key token). If the deployment requires
ditribute the key from the vendor, it's not the strong name key. In this
case, I suggest you try to post in the microsoft.public.sms.admin newsgroup
for more information on how to distribute the keys.

Kevin Yu
=======
"This posting is provided "AS IS" with no warranties, and confers no
rights."

Oct 18 '05 #5
I hope you'll both look at this and tell me if you think I should still post
this where you suggested, Kevin.

My explaination of the situation is confusing because I know just enough to
be dangerous. People are explaining it to me and I don't know that they're
using the right words. Now I know more information.

As you suggested it is not the strong keys that are needed; they're compiled
into the code. Apparently we're using three components, and the securitiy
policy (machine level usually) needs to be set with the "public key." Or is
this more correctly called the GUID? Anyway, from the MS Security Policy
config tool one can either point to the dlls or with the poliicy setting tool
put in the "keys" (which we supply them). Having to do this manual process
on each machine is not nice!

We'd like to be able to automate this process to it can be pushed out to
clients (SMS?) or otherwise made as easy as possible for administrators.

We did create an MSI script from one machine and ran it on another, and this
did the job! The bad news is it blows away other secccurity policeis on the
target machine! Not good! Is there a way to have the MSI do just "our"
changes?

Hope this makes more sense than what I previously wrote. Thaks for your
help, guys.

"Kevin Yu [MSFT]" wrote:
Hi,

Yes, I agree with Richard, that the strong named assemblies contains their
own information on key(public key token). If the deployment requires
ditribute the key from the vendor, it's not the strong name key. In this
case, I suggest you try to post in the microsoft.public.sms.admin newsgroup
for more information on how to distribute the keys.

Kevin Yu
=======
"This posting is provided "AS IS" with no warranties, and confers no
rights."

Oct 18 '05 #6
Hi,

From your description, it seems the key you mentioned is not the strong
named key in .net assembly. They are different concepts. I'm not quite
familiar with how to deploy these keys with MSI scripts. Please try to ask
in the newsgroup I have suggested for SMS issue. Also, for MSI scripts, you
can also post in the following newsgroup.

microsoft.public.windows.msi

Kevin Yu
=======
"This posting is provided "AS IS" with no warranties, and confers no
rights."

Oct 19 '05 #7

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

129
by: Torbjørn Pettersen | last post by:
I've started cleaning up my HTML and implementing CSS. So far I've used FrontPage, but am switching over to DreamWeaver. Reading a bit on W3Schools.com and W3.org I see there are a lot of HTML...
3
by: Rachel | last post by:
Hi, I am using the data access application block successfully in our development environment, however when I deploy to our testing server as Private Assemblies I keep getting the following ...
3
by: Rachel | last post by:
Hi, I am using the data access application block successfully in our development environment, however when I deploy to our testing server as Private Assemblies I keep getting the following ...
1
by: rodchar | last post by:
hey all, let's say i develop a custom control and want to deploy to the gac. i use the strong name utility and move it to the gac on the web server. now when other developers develop with my...
3
by: Mark Ingram | last post by:
Hi, what steps do i need to undertake before / when i deploy a c# application? Generate strong name key? Add the file to the GAC? What else?
4
by: Ant | last post by:
Hi, I'm a newbie to .NET so... After developing a simple, non distributed application (if that's still applicable these days), how do I move the appliation to another PC? Is it simply a matter of...
0
by: E Jensen | last post by:
I am trying to deploy a .NET 2.0 Application to the network. However, I have run into the Runtime Security Policy problem. The whole point of deploying to the network instead of to each user's...
1
by: Jason Richmeier | last post by:
In a project I am working on, it sounds like resource files are what I need (to group things like error message strings). If I put a resource file in a project, everything will work fine. ...
6
by: Ryan | last post by:
Is there any way to save a VB 2005 created application as an .MSI install file? The only method I see is to publish as a .EXE. Curious because I want to push out an application with Group Policy....
2
by: ydmishra | last post by:
Hi I have a windows application which have some dlls and exe files . I have made strong name for application and deployed it on computer A. Now when i try to open the project from computer B i get ...
0
by: DolphinDB | last post by:
Tired of spending countless mintues downsampling your data? Look no further! In this article, you’ll learn how to efficiently downsample 6.48 billion high-frequency records to 61 million...
0
by: ryjfgjl | last post by:
ExcelToDatabase: batch import excel into database automatically...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
1
by: PapaRatzi | last post by:
Hello, I am teaching myself MS Access forms design and Visual Basic. I've created a table to capture a list of Top 30 singles and forms to capture new entries. The final step is a form (unbound)...
1
by: Defcon1945 | last post by:
I'm trying to learn Python using Pycharm but import shutil doesn't work
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.