Visual Studio Tools for Office: Using C# with Excel, Word, Outlook, and InfoPath [Electronic resources]

Eric Carter, Eric Lippert

نسخه متنی -صفحه : 213/ 146
نمايش فراداده

Conclusion

That was a lot of information; security administration can be complex. The key takeaways from this chapter include the following:

  • VSTO customization code will not run under the "out-of-the-box" security policy. Some additional policy must be applied that allows customizations to run. Choose your enterprise's security policies carefully.

  • The AppDomain policy level will not consider zone-based evidence for the customization assembly.

  • Both the customization and the document location must be fully trusted; there is no partial-trust scenario for calling the Word and Excel object models.

  • Strong names and publisher certificates use similar technology but solve slightly different problems. It is possible to use both forms of evidence in the same assembly.

  • A document that is opened from an intranet or Internet location must have additional policy to trust the document location; this policy is created using the Office Document Membership Condition.