Are there any access control mechanisms to govern what a secondary process can 
do to a primary process?

Let's say I'm running a primary process, and want to allow only authorized 
secondary processes to attach to it. No unauthorized secondary processes should 
be able to attach to it.

I assume there is no fine grained control over which features various secondary 
processes can access.


Med venlig hilsen / Kind regards,
-Morten Brørup

Reply via email to