automatically process messages as they arrive at a given mailbox. Developers also are using CDO 1.2 to write server-event scripts, which provide automatic scripting when messages are deposited to or deleted from public folders.
Design-time controls provide one of the easiest ways for developers to add collaborative functionality to current Web applications. With the design-time controls available in the Microsoft Visual InterDev™ integrated Web application development system environment, developers of Web applications can add collaborative functionality without having to write any code.
For many applications, developers accustomed to working with extended MAPI (messaging application programming interface) might wonder whether they should use CDO 1.2 instead. The answer is: It depends. Extended MAPI is clearly the better choice for development in a service-provider environment; for message transport, directory, or store; or for complex, high-performance client applications. In these areas, developers would find extended MAPI the better choice, because of its comprehensive functionality and performance. In contrast, for Web-based solutions and rapid applications, CDO 1.2 provides advantages unavailable in extended MAPI, such as automatic rendering of content to HTML and easy access from Visual Basic or Visual Basic for Applications.
As pointed out earlier, CDO 1.2 is compatible with all popular development environments. The only adjustment necessary is for Visual C++® development system set developers, who must use a wrapper with CDO 1.2, because it lacks dual interfaces.
Anonymous and Authenticated Access
CDO 1.2 provides developers two methods of access: anonymous and authenticated. Both methods support SSL, which is crucial for a Web development environment, because of its support for a secure session with encryption between server and client.
To support anonymous access, CDO 1.2 provides a directory object enabling developers to display a list of public folders that are available to an anonymous user. Both developers and administrators can set permissions allowing or disallowing such access to these folders. This capability is particularly useful, for example, in building Web sites to which users log on anonymously and want fast and easy access to collections of folders.
With authenticated access, users can open an Exchange mailbox using either Basic (clear text) or Windows NT Challenge Response authentication. They then are authenticated against their Windows NT user name and password before being allowed access to their Exchange server. Authenticated access enables developers to leverage Exchange and Windows NT security settings in their applications. (For more information on Internet Information Server and Active Server Pages, please visit )
Microsoft Exchange Introduction to Collaboration Data Objects White Paper2