Setup Permissions
Topic Last Modified: 2008-08-06
This topic provides information about how the different technologies compare with regard to Setup Permissions.
Technology | What permissions are needed to install applications that use the technology? |
---|---|
Active Directory Services Interfaces (ADSI) |
No special permissions are needed to install applications that use ADSI, beyond those needed to install applications of similar architecture. If the Setup application must make schema changes to Active Directory, the user running Setup must be a schema administrator in the domain. If the setup application must change data inside Active Directory, the user running Setup must have appropriate permissions to make those changes. |
Collaboration Data Objects for Windows 2000 (CDOSYS) |
No special permissions are needed to install applications that use CDOSYS beyond those needed to install applications of similar architecture. If the setup program makes configuration changes to a local SMTP or NNTP service, the user must have sufficient permissions to make those changes. |
CDOSYS SMTP/NNTP Event Sinks |
Because unencrypted sensitive information may be flowing through the production e-mail server, use care when granting permission to install software. It is recommended that deployment to the production servers be performed by administrators. |
Collaboration Data Objects for Exchange 2000 Server (CDOEX) |
Because applications that use CDOEX must run on the Exchange server, the user setting up the application must have permissions to install software on the server. In addition, if Setup makes changes to Exchange, the user must have permission to access that data or make the configuration changes. |
Collaboration Data Objects for Exchange Management (CDOEXM) |
Applications that use CDOEXM must either run on an Exchange server, or on a computer on which the Exchange Administrative Tools have been installed. The user setting up the application must have permissions to install software on that computer. In addition, if Setup makes changes to Exchange, the user must have permission to access that data or make the configuration changes. |
Collaboration Data Objects for Exchange Workflow (CDOWF) |
Applications that use CDOWF are stored on the Exchange server. Direct access to that server, however, is not required. The Workflow Designer can be used to remotely deploy workflow applications on an Exchange server, with the requirement that the user have sufficient permissions to access the mailboxes on which the application is to be installed. |
Exchange OLE DB Provider (ExOLEDB) |
Applications that use ExOLEDB must be run on the Exchange server where the data is stored, The user installing the application must have permissions on that Exchange server. Use caution when granting anyone permission to install software on a production Exchange server. Those permissions should be reviewed after the application is installed and tested. |
Exchange Store Event Sinks |
A user who has sufficient permission to register event sinks on the folder must perform the setup of applications that use Exchange store event sinks. Additional permissions may be needed to register the COM component, and create a COM+ application on the Exchange server. |
Exchange Web Forms |
A user who has sufficient permissions to access the folder and to register the form must perform the setup of applications that use Exchange Web forms. |
Exchange Web Services |
Because applications that use Exchange Web Services run on either the client or middle tier, typically no special Exchange server permissions are needed for Setup. If the Setup program makes changes in the Exchange store, the user running Setup must have the necessary permissions to make those changes. |
HTTP/Web Distributed Authoring and Versioning (WebDAV) |
Because applications that use WebDAV run on either the client or middle tier, typically no special Exchange server permissions are needed for setup. If the Setup program makes changes in the Exchange store, the user running Setup must have the necessary permissions to make those changes. |
WebDAV Notifications |
Because applications that use WebDAV run on either the client or middle tier, typically no special Exchange server permissions are needed for Setup. If the Setup program makes changes in the Exchange store, for example to create the notification, the user running Setup must have the necessary permissions to make those changes. |
Incremental Change Synchronization (ICS) |
No special permissions are required to set up applications that use ICS. |
Lightweight Directory Access Protocol (LDAP) |
No special permissions are required to set up applications that use ICS. |
Messaging Application Programming Interface (MAPI) |
Setting up MAPI-based applications typically requires the user to be a local administrator, or have rights to install software. |
Outlook Object Model (OOM) |
No special permissions are required to install applications that use OOM. However, local administrator rights are required to install Microsoft Office and Outlook. |
Outlook Web Access |
Microsoft Outlook Web Access customization and component reuse is not supported by Microsoft. |
Exchange Rules |
Setting up applications that use Exchange Rules typically requires the user to be a local administrator, or have rights to install software. |
SMTP Event Sinks |
Because unencrypted sensitive information may be flowing through the production e-mail server, use care when granting permission to install software. It is recommended that deployment to the production servers be performed by administrators. |
Windows Management Instrumentation (WMI) providers for Exchange |
WMI scripts can typically be copied to the intended machine and run without modification. The client computer must be in the same domain as the target computer. Depending on the type of Setup program used, the user may need local administrator rights to install software. |
Exchange Backup and Restore API |
No special permissions are required to install applications that use the Exchange Backup and Restore API. Because the applications must run on the computer running Exchange, the account under which the application is installed must have sufficient permission to install software on that computer. |
Exchange writer for the Windows Volume Shadow Copy Service |
No special permissions are required to install applications that use VSS. Because the applications must run on the computer running Exchange, the account under which the application is installed must have sufficient permission to install software on that computer. |