In this chapter, you took a look into the details for creating different types of .NET Remoting clients. You saw the different ways for configuring clients and also saw that you have to be careful when configuring .NET Remoting in ASP.NET-based client applications.
In the last section of this chapter, you took a closer look at some security concerns-especially how you can flow the identity from the client to the server. In general, a very good strategy for flowing identities is having separate accounts for roles of users to not flow all the end users through all tiers of your distributed applications for easier management. Don’t forget that Kerberos must be configured properly when identities flow across machine borders.
Unable to display preview. Download preview PDF.