Summary

Neither Isolated Storage or cryptography configuration settings are likely to be on your list of areas requiring frequent administration. For this reason, there is very little tool support for setting state for either of these technologies, and you should have a good understanding of the contents of this chapter before making any administrative modifications in either area. Isolated Storage will require you to write your own administrative code, using the API set introduced in this chapter, if you want to do more than erasing all Isolated Storage state for a user. Likewise, cryptography configuration settings will require you to write an XML representation of the mappings you want the cryptography configuration system to make. Because both writing code and creating XML are error prone, you are well advised to take your time and thoroughly test each change.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
52.14.8.34