Geeks With Blogs

News kaleidoscope 1817, lit. "observer of beautiful forms," coined by its inventor, Sir David Brewster (1781-1868), from Gk. kalos "beautiful" + eidos "shape" (see -oid) + -scope, on model of telescope, etc. Figurative meaning "constantly changing pattern" is first attested 1819 in Lord Byron, whose publisher had sent him one.

Kaleidoscope Everything under the sun, ending in .Net

Under Windows Azure full trust, your role has access to a variety of system resources that are not available under partial trust

File System Resources

A role running in Windows Azure has permissions to read and write to certain file, directory, and volume resources on the server. These permissions are outlined in the following table. 

File system resource

Permission

System root directory

No access

Subdirectories of the system root directory

No access

Windows directory

Read access only

Machine configuration files

No access

Service configuration file

Read access only

Local storage resource

Full access

Registry Resources

The following table outlines permissions available to the role when accessing the registry while running in Windows Azure.

HKEY_CLASSES_ROOT

Read access

HKEY_CURRENT_USER

No access

HKEY_LOCAL_MACHINE

Read access

HKEY_USERS

Read access

HKEY_CURRENT_CONFIG

Read access

More details can be found at: http://msdn.microsoft.com/en-us/library/dd573363.aspx

 

Amit

Technorati Tags:
Posted on Sunday, March 21, 2010 4:42 PM | Back to top


Comments on this post: Azure Full trust permissions

No comments posted yet.
Your comment:
 (will show your gravatar)


Copyright © kaleidoscope | Powered by: GeeksWithBlogs.net