A service, like any process, has a primary security identity that determines the granted access rights and privileges for local and network resources.
This security identity, or security context, also determines the potential the service has for damaging local and network resources. The security context for a Microsoft Win32 service is determined by the logon account that is used to start the service. This section discusses programming issues and best practices relating to the service logon account used by Win32 services, with a focus on directory-enabled services.
This section includes the following topics:. Business Applications. Cloud Applications. Internet of Things. Inclusive Economy. Developer Network. Windows Dev Center. Windows IT Pro Center. Azure Marketplace. Connect With Partners. Go To Market. Build A Solution. Microsoft Partner Blog. Sell With Microsoft. Compare Support Offers. Partner Center Help. Top Support Topics.
United States English. Contact us. Privacy and cookies. Johnson Controls uses Microsoft for virtual global tech challenge, democratizing innovation and enhancing their pipeline. Looking to use Stream for the web? Sign in. Microsoft Stream Drive engagement and productivity with video See plans and pricing.
Microsoft Stream. Plans and pricing. Deliver live and on-demand events with Microsoft Enhance your communications, company meetings, and training with events for up-to 10, attendees. Learn more about live and on-demand events. Get Microsoft Stream with Microsoft See plans and pricing.
Explore additional resources Access help and learning resources Learn about video best practices and other support materials.
0コメント