Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

3
  • Another excellent contribution that deserves some upvotes. Commented Oct 3, 2013 at 15:15
  • This one resembles the 'canonical answer' the bounty is promised for. I'll wait a little longer if any improvements show up. Thanks for the effort! Commented Oct 5, 2013 at 9:37
  • 1
    thanks! i had to read your question a couple of times to fully understand what you were looking for! My answer was based on my understanding and debugging the code/experience! its a tough question as its relating to the architecture of sharepoint and the flow of information! more specifically the security context! If i have any more info on the subject im sure to update accordingly! Commented Oct 7, 2013 at 9:06