Security

The NCS2 WMI Provider uses client impersonation to manage the security.  Every call into the Provider will be made in the client’s own security context.  This context is passed down to the lower layers.  An operation may fail if the user does not have suitable administrative rights on the target machine.

 Home


Copyright© 2004 Intel Corporation. Legal Information