Security for ISAPI extensions is derived from the Microsoft® Windows 2000 security model. If your extension accesses secured system resources, it must obtain the appropriate Windows 2000 permissions. Several interrelated issues determine how you accomplish this programming task. This topic provides an overview of these security issues and outlines the processing steps required to access secured resources.
The topic is divided into the following subsections: