Solved

COM Security

Posted on 2008-10-31
3
245 Views
Last Modified: 2012-05-05
>> I had to add the user to MsDtsServer DCOM and to COM Security.

Where do you configure COM Security?
0
Comment
Question by:cartereverett
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 42

Expert Comment

by:Eugene Z
ID: 22871026
try  Component Services
Configures and manages COM+ applications
C:\WINDOWS\system32\Com\comexp.msc
0
 
LVL 42

Accepted Solution

by:
Eugene Z earned 500 total points
ID: 22871144
one more:
Connecting to a Remote Integration Services Server...
http://msdn.microsoft.com/en-us/library/aa337083(SQL.90).aspx 
0
 

Author Closing Comment

by:cartereverett
ID: 31512202
Yes, I actually figured this out over the weekend.  This is correct if you include the notes posted at the end of the MSDN article.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
PERFORMANCE OF SQL QUERY 13 77
How to query LOCK_ESCALATION 4 42
Unable to save view in SSMS 21 79
Present Absent from working date rage 11 48
I've encountered valid database schemas that do not have a primary key.  For example, I use LogParser from Microsoft to push IIS logs into a SQL database table for processing and analysis.  However, occasionally due to user error or a scheduled task…
INTRODUCTION: While tying your database objects into builds and your enterprise source control system takes a third-party product (like Visual Studio Database Edition or Red-Gate's SQL Source Control), you can achieve some protection using a sing…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question