Advanced URL ACLing with Windows Vista

This article covers some of the advanced topics that I left out of the earlier piece on configuring HTTP for Windows Vista. In addition to having gone over the basics article, it would also be helpful to have at least a little background knowledge about Windows security descriptors. The standard command for giving a user…

3

The GetProperty Picture

I drew this picture for myself while working on the guidelines for implementing GetProperty. I figured that other people might find it useful as well. One of the guidelines is that queryable properties on design time objects should flow to the corresponding run time objects. The black boxes show the classes that support GetProperty and…

1

Datagram Transports

Datagrams are a self-contained unit of data. Each datagram carries with it the routing and context information needed to receive the data without knowing about any earlier exchanges of information. This means that you can continue sending datagrams from a source to a destination even if past datagrams along this path have been lost, duplicated,…

1

Implementation Guidelines for GetProperty

This post is just some quick thinking about guidelines for implementing the GetProperty method. These guidelines are still in development so think of this as a draft rather than real guidance at this time. Background: We provide an extensibility point called GetProperty on many of the components you can build using the channel model. The…

6

Asymmetry Between Listeners and Factories

Throughout much of WCF development, we tried to preserve some fundamental symmetries between the client and server sides of messaging. A few months ago in the earlier release candidates, we ended up having to break one symmetry between channel factories and channel listeners. This broken symmetry involves the management of the lifetimes of the channels created…

6

Two Hundred and First Post

Yesterday’s post was the two hundredth post, an event which I almost decided not to mention. After all, at the current pace, a hundredth post is going to come around almost three times a year. Most of them are not going to be as exciting as the first time there was a hundredth post. It…

0

Comment and Email Policy (Abridged Edition)

I haven’t had a lot of problems with people commenting, although I occasionally get more inquiries than I can individually respond to in a timely manner. That’s why I haven’t had to make any kind of real comment policy, although I did put up a disclaimer a few weeks ago. I try to respond with…

0

Configuring IIS for Transport Security

I’m hosting a WCF application in IIS that uses transport security. How do I configure the security settings for my Virtual Directory (VDir)? The general model that we try to promote in WCF is that if a setting is shared between multiple places, the value of the setting has to match between all of those…

4

Keeping Connections Open in IIS

My web service needs to periodically broadcast messages to clients. The service is an Internet-facing application hosted inside of IIS. What’s the best way to do this? The big limitation in this scenario is that your clients might be behind a firewall and non-addressable. There are basically two architecture camps for broadcasting messages to clients…

3

How HostNameComparisonMode Works

How do I configure my service to listen on all of the host names for my machine? How do I configure my service to only listen on one particular host name? I sometimes see these funny + and * characters in URLs when using WCF. What do these characters mean? All three of these questions…

5