Managing Users in Roles

Most administration tasks for configuring COM+ application security involve populating predefined roles with users, both when installing applications and on an ongoing basis. For introductory information about how these security features work, see Configuring Role-Based Security.

In this section, step-by-step instructions are provided for the following tasks: