Summary

In this hour you explored the architecture and concept of sandboxed solutions. You also learned how sandboxed solutions can be deployed, monitored, and administered. You learned how to develop a full trust proxy and how to break the boundaries of a sandbox using the same. Finally you learned about solution validators, which enable administrators to prevent activation of any rogue solutions and thus proactively safeguard the farm against bad code.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset