Are there any access control mechanisms to govern what a secondary process can do to a primary process?
Let's say I'm running a primary process, and want to allow only authorized secondary processes to attach to it. No unauthorized secondary processes should be able to attach to it. I assume there is no fine grained control over which features various secondary processes can access. Med venlig hilsen / Kind regards, -Morten Brørup