mscorlib(4.0.0.0) API with additions
System.Security.Permissions Namespace Reference

Classes

class  CodeAccessSecurityAttribute
 Specifies the base attribute class for code access security. More...
 
class  EnvironmentPermission
 Controls access to system and user environment variables. This class cannot be inherited. More...
 
class  EnvironmentPermissionAttribute
 Allows security actions for T:System.Security.Permissions.EnvironmentPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  FileDialogPermission
 Controls the ability to access files or folders through a File dialog box. This class cannot be inherited. More...
 
class  FileDialogPermissionAttribute
 Allows security actions for T:System.Security.Permissions.FileDialogPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  FileIOPermission
 Controls the ability to access files and folders. This class cannot be inherited. More...
 
class  FileIOPermissionAttribute
 Allows security actions for T:System.Security.Permissions.FileIOPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  GacIdentityPermission
 Defines the identity permission for files originating in the global assembly cache. This class cannot be inherited. More...
 
class  GacIdentityPermissionAttribute
 Allows security actions for T:System.Security.Permissions.GacIdentityPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  HostProtectionAttribute
 Allows the use of declarative security actions to determine host protection requirements. This class cannot be inherited. More...
 
class  IsolatedStorageFilePermission
 Specifies the allowed usage of a private virtual file system. This class cannot be inherited. More...
 
class  IsolatedStorageFilePermissionAttribute
 Allows security actions for T:System.Security.Permissions.IsolatedStorageFilePermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  IsolatedStoragePermission
 Represents access to generic isolated storage capabilities. More...
 
class  IsolatedStoragePermissionAttribute
 Allows security actions for T:System.Security.Permissions.IsolatedStoragePermission to be applied to code using declarative security. More...
 
interface  IUnrestrictedPermission
 Allows a permission to expose an unrestricted state. More...
 
class  KeyContainerPermission
 Controls the ability to access key containers. This class cannot be inherited. More...
 
class  KeyContainerPermissionAccessEntry
 Specifies access rights for specific key containers. This class cannot be inherited. More...
 
class  KeyContainerPermissionAccessEntryCollection
 Represents a collection of T:System.Security.Permissions.KeyContainerPermissionAccessEntry objects. This class cannot be inherited. More...
 
class  KeyContainerPermissionAccessEntryEnumerator
 Represents the enumerator for T:System.Security.Permissions.KeyContainerPermissionAccessEntry objects in a T:System.Security.Permissions.KeyContainerPermissionAccessEntryCollection. More...
 
class  KeyContainerPermissionAttribute
 Allows security actions for T:System.Security.Permissions.KeyContainerPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  PermissionSetAttribute
 Allows security actions for a T:System.Security.PermissionSet to be applied to code using declarative security. This class cannot be inherited. More...
 
class  PrincipalPermission
 Allows checks against the active principal (see T:System.Security.Principal.IPrincipal) using the language constructs defined for both declarative and imperative security actions. This class cannot be inherited. More...
 
class  PrincipalPermissionAttribute
 Allows security actions for T:System.Security.Permissions.PrincipalPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  PublisherIdentityPermission
 Represents the identity of a software publisher. This class cannot be inherited. More...
 
class  PublisherIdentityPermissionAttribute
 Allows security actions for T:System.Security.Permissions.PublisherIdentityPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  ReflectionPermission
 Controls access to non-public types and members through the N:System.Reflection APIs. Controls some features of the N:System.Reflection.Emit APIs. More...
 
class  ReflectionPermissionAttribute
 Allows security actions for T:System.Security.Permissions.ReflectionPermission to be applied to code using declarative security. More...
 
class  RegistryPermission
 Controls the ability to access registry variables. This class cannot be inherited. More...
 
class  RegistryPermissionAttribute
 Allows security actions for T:System.Security.Permissions.RegistryPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  ResourcePermissionBase
 Allows control of code access security permissions. More...
 
class  ResourcePermissionBaseEntry
 Defines the smallest unit of a code access security permission set. More...
 
class  SecurityAttribute
 Specifies the base attribute class for declarative security from which T:System.Security.Permissions.CodeAccessSecurityAttribute is derived. More...
 
class  SecurityPermission
 Describes a set of security permissions applied to code. This class cannot be inherited. More...
 
class  SecurityPermissionAttribute
 Allows security actions for T:System.Security.Permissions.SecurityPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  SiteIdentityPermission
 Defines the identity permission for the Web site from which the code originates. This class cannot be inherited. More...
 
class  SiteIdentityPermissionAttribute
 Allows security actions for T:System.Security.Permissions.SiteIdentityPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  StorePermission
 Controls access to stores containing X.509 certificates. This class cannot be inherited. More...
 
class  StorePermissionAttribute
 Allows security actions for T:System.Security.Permissions.StorePermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  StrongNameIdentityPermission
 Defines the identity permission for strong names. This class cannot be inherited. More...
 
class  StrongNameIdentityPermissionAttribute
 Allows security actions for T:System.Security.Permissions.StrongNameIdentityPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  StrongNamePublicKeyBlob
 Represents the public key information (called a blob) for a strong name. This class cannot be inherited. More...
 
class  TypeDescriptorPermission
 Defines partial-trust access to the T:System.ComponentModel.TypeDescriptor class. More...
 
class  TypeDescriptorPermissionAttribute
 Determines the permission flags that apply to a T:System.ComponentModel.TypeDescriptor. More...
 
class  UIPermission
 Controls the permissions related to user interfaces and the Clipboard. This class cannot be inherited. More...
 
class  UIPermissionAttribute
 Allows security actions for T:System.Security.Permissions.UIPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  UrlIdentityPermission
 Defines the identity permission for the URL from which the code originates. This class cannot be inherited. More...
 
class  UrlIdentityPermissionAttribute
 Allows security actions for T:System.Security.Permissions.UrlIdentityPermission to be applied to code using declarative security. This class cannot be inherited. More...
 
class  ZoneIdentityPermission
 Defines the identity permission for the zone from which the code originates. This class cannot be inherited. More...
 
class  ZoneIdentityPermissionAttribute
 Allows security actions for T:System.Security.Permissions.ZoneIdentityPermission to be applied to code using declarative security. This class cannot be inherited. More...
 

Enumerations

enum  BuiltInPermissionFlag {
  EnvironmentPermission = 1, FileDialogPermission = 2, FileIOPermission = 4, IsolatedStorageFilePermission = 8,
  ReflectionPermission = 0x10, RegistryPermission = 0x20, SecurityPermission = 0x40, UIPermission = 0x80,
  PrincipalPermission = 0x100, PublisherIdentityPermission = 0x200, SiteIdentityPermission = 0x400, StrongNameIdentityPermission = 0x800,
  UrlIdentityPermission = 0x1000, ZoneIdentityPermission = 0x2000, KeyContainerPermission = 0x4000
}
 
enum  EnvironmentPermissionAccess { EnvironmentPermissionAccess.NoAccess = 0x0, EnvironmentPermissionAccess.Read = 0x1, EnvironmentPermissionAccess.Write = 0x2, EnvironmentPermissionAccess.AllAccess = 0x3 }
 Specifies access to environment variables. More...
 
enum  FileDialogPermissionAccess { FileDialogPermissionAccess.None = 0x0, FileDialogPermissionAccess.Open = 0x1, FileDialogPermissionAccess.Save = 0x2, FileDialogPermissionAccess.OpenSave = 0x3 }
 Specifies the type of access to files allowed through the File dialog boxes. More...
 
enum  FileIOPermissionAccess {
  FileIOPermissionAccess.NoAccess = 0x0, FileIOPermissionAccess.Read = 0x1, FileIOPermissionAccess.Write = 0x2, FileIOPermissionAccess.Append = 0x4,
  FileIOPermissionAccess.PathDiscovery = 0x8, FileIOPermissionAccess.AllAccess = 0xF
}
 Specifies the type of file access requested. More...
 
enum  HostProtectionResource {
  HostProtectionResource.None = 0x0, HostProtectionResource.Synchronization = 0x1, HostProtectionResource.SharedState = 0x2, HostProtectionResource.ExternalProcessMgmt = 0x4,
  HostProtectionResource.SelfAffectingProcessMgmt = 0x8, HostProtectionResource.ExternalThreading = 0x10, HostProtectionResource.SelfAffectingThreading = 0x20, HostProtectionResource.SecurityInfrastructure = 0x40,
  HostProtectionResource.UI = 0x80, HostProtectionResource.MayLeakOnAbort = 0x100, HostProtectionResource.All = 0x1FF
}
 Specifies categories of functionality potentially harmful to the host if invoked by a method or class. More...
 
enum  IsolatedStorageContainment {
  IsolatedStorageContainment.None = 0, IsolatedStorageContainment.DomainIsolationByUser = 0x10, IsolatedStorageContainment.ApplicationIsolationByUser = 21, IsolatedStorageContainment.AssemblyIsolationByUser = 0x20,
  IsolatedStorageContainment.DomainIsolationByMachine = 48, IsolatedStorageContainment.AssemblyIsolationByMachine = 0x40, IsolatedStorageContainment.ApplicationIsolationByMachine = 69, IsolatedStorageContainment.DomainIsolationByRoamingUser = 80,
  IsolatedStorageContainment.AssemblyIsolationByRoamingUser = 96, IsolatedStorageContainment.ApplicationIsolationByRoamingUser = 101, IsolatedStorageContainment.AdministerIsolatedStorageByUser = 112, IsolatedStorageContainment.UnrestrictedIsolatedStorage = 240
}
 Specifies the permitted use of isolated storage. More...
 
enum  KeyContainerPermissionFlags {
  KeyContainerPermissionFlags.NoFlags = 0x0, KeyContainerPermissionFlags.Create = 0x1, KeyContainerPermissionFlags.Open = 0x2, KeyContainerPermissionFlags.Delete = 0x4,
  KeyContainerPermissionFlags.Import = 0x10, KeyContainerPermissionFlags.Export = 0x20, KeyContainerPermissionFlags.Sign = 0x100, KeyContainerPermissionFlags.Decrypt = 0x200,
  KeyContainerPermissionFlags.ViewAcl = 0x1000, KeyContainerPermissionFlags.ChangeAcl = 0x2000, KeyContainerPermissionFlags.AllFlags = 0x3337
}
 Specifies the type of key container access allowed. More...
 
enum  PermissionState { PermissionState.Unrestricted = 1, PermissionState.None = 0 }
 Specifies whether a permission should have all or no access to resources at creation. More...
 
enum  ReflectionPermissionFlag {
  ReflectionPermissionFlag.NoFlags = 0x0, ReflectionPermissionFlag.TypeInformation = 0x1, ReflectionPermissionFlag.MemberAccess = 0x2, ReflectionPermissionFlag.ReflectionEmit = 0x4,
  ReflectionPermissionFlag.RestrictedMemberAccess = 0x8, ReflectionPermissionFlag.AllFlags = 0x7
}
 Specifies the permitted use of the N:System.Reflection and N:System.Reflection.Emit namespaces. More...
 
enum  RegistryPermissionAccess {
  RegistryPermissionAccess.NoAccess = 0x0, RegistryPermissionAccess.Read = 0x1, RegistryPermissionAccess.Write = 0x2, RegistryPermissionAccess.Create = 0x4,
  RegistryPermissionAccess.AllAccess = 0x7
}
 Specifies the permitted access to registry keys and values. More...
 
enum  SecurityAction {
  SecurityAction.Demand = 2, SecurityAction.Assert, SecurityAction.Deny, SecurityAction.PermitOnly,
  SecurityAction.LinkDemand, SecurityAction.InheritanceDemand, SecurityAction.RequestMinimum, SecurityAction.RequestOptional,
  SecurityAction.RequestRefuse
}
 Specifies the security actions that can be performed using declarative security. More...
 
enum  SecurityPermissionFlag {
  SecurityPermissionFlag.NoFlags = 0x0, SecurityPermissionFlag.Assertion = 0x1, SecurityPermissionFlag.UnmanagedCode = 0x2, SecurityPermissionFlag.SkipVerification = 0x4,
  SecurityPermissionFlag.Execution = 0x8, SecurityPermissionFlag.ControlThread = 0x10, SecurityPermissionFlag.ControlEvidence = 0x20, SecurityPermissionFlag.ControlPolicy = 0x40,
  SecurityPermissionFlag.SerializationFormatter = 0x80, SecurityPermissionFlag.ControlDomainPolicy = 0x100, SecurityPermissionFlag.ControlPrincipal = 0x200, SecurityPermissionFlag.ControlAppDomain = 0x400,
  SecurityPermissionFlag.RemotingConfiguration = 0x800, SecurityPermissionFlag.Infrastructure = 0x1000, SecurityPermissionFlag.BindingRedirects = 0x2000, SecurityPermissionFlag.AllFlags = 0x3FFF
}
 Specifies access flags for the security permission object. More...
 
enum  StorePermissionFlags {
  StorePermissionFlags.NoFlags = 0x0, StorePermissionFlags.CreateStore = 0x1, StorePermissionFlags.DeleteStore = 0x2, StorePermissionFlags.EnumerateStores = 0x4,
  StorePermissionFlags.OpenStore = 0x10, StorePermissionFlags.AddToStore = 0x20, StorePermissionFlags.RemoveFromStore = 0x40, StorePermissionFlags.EnumerateCertificates = 0x80,
  StorePermissionFlags.AllFlags = 0xF7
}
 Specifies the permitted access to X.509 certificate stores. More...
 
enum  TypeDescriptorPermissionFlags { TypeDescriptorPermissionFlags.NoFlags = 0x0, TypeDescriptorPermissionFlags.RestrictedRegistrationAccess = 0x1 }
 Defines permission settings for type descriptors. More...
 
enum  UIPermissionClipboard { UIPermissionClipboard.NoClipboard, UIPermissionClipboard.OwnClipboard, UIPermissionClipboard.AllClipboard }
 Specifies the type of clipboard access that is allowed to the calling code. More...
 
enum  UIPermissionWindow { UIPermissionWindow.NoWindows, UIPermissionWindow.SafeSubWindows, UIPermissionWindow.SafeTopLevelWindows, UIPermissionWindow.AllWindows }
 Specifies the type of windows that code is allowed to use. More...
 

Enumeration Type Documentation

◆ EnvironmentPermissionAccess

Specifies access to environment variables.

Enumerator
NoAccess 

No access to environment variables. F:System.Security.Permissions.EnvironmentPermissionAccess.NoAccess represents no valid T:System.Security.Permissions.EnvironmentPermissionAccess values and causes an T:System.ArgumentException when used as the parameter for M:System.Security.Permissions.EnvironmentPermission.GetPathList(System.Security.Permissions.EnvironmentPermissionAccess), which expects a single value.

Read 

Only read access to environment variables is specified. Changing, deleting and creating environment variables is not included in this access level.

Write 

Only write access to environment variables is specified. Write access includes creating and deleting environment variables as well as changing existing values. Reading environment variables is not included in this access level.

AllAccess 

F:System.Security.Permissions.EnvironmentPermissionAccess.Read and F:System.Security.Permissions.EnvironmentPermissionAccess.Write access to environment variables. F:System.Security.Permissions.EnvironmentPermissionAccess.AllAccess represents multiple T:System.Security.Permissions.EnvironmentPermissionAccess values and causes an T:System.ArgumentException when used as the flag parameter for the M:System.Security.Permissions.EnvironmentPermission.GetPathList(System.Security.Permissions.EnvironmentPermissionAccess) method, which expects a single value.

Definition at line 9 of file EnvironmentPermissionAccess.cs.

◆ FileDialogPermissionAccess

Specifies the type of access to files allowed through the File dialog boxes.

Enumerator
None 

No access to files through the File dialog boxes.

Open 

Ability to open files through the File dialog boxes.

Save 

Ability to save files through the File dialog boxes.

OpenSave 

Ability to open and save files through the File dialog boxes.

Definition at line 9 of file FileDialogPermissionAccess.cs.

◆ FileIOPermissionAccess

Specifies the type of file access requested.

Enumerator
NoAccess 

No access to a file or directory. F:System.Security.Permissions.FileIOPermissionAccess.NoAccess represents no valid T:System.Security.Permissions.FileIOPermissionAccess values and causes an T:System.ArgumentException when used as the parameter for M:System.Security.Permissions.FileIOPermission.GetPathList(System.Security.Permissions.FileIOPermissionAccess), which expects a single value.

Read 

Access to read from a file or directory.

Write 

Access to write to or delete a file or directory. F:System.Security.Permissions.FileIOPermissionAccess.Write access includes deleting and overwriting files or directories.

Append 

Access to append material to a file or directory. F:System.Security.Permissions.FileIOPermissionAccess.Append access includes the ability to create a new file or directory.

PathDiscovery 

Access to the information in the path itself. This helps protect sensitive information in the path, such as user names, as well as information about the directory structure revealed in the path. This value does not grant access to files or folders represented by the path.

AllAccess 

F:System.Security.Permissions.FileIOPermissionAccess.Append, F:System.Security.Permissions.FileIOPermissionAccess.Read, F:System.Security.Permissions.FileIOPermissionAccess.Write, and F:System.Security.Permissions.FileIOPermissionAccess.PathDiscovery access to a file or directory. F:System.Security.Permissions.FileIOPermissionAccess.AllAccess represents multiple T:System.Security.Permissions.FileIOPermissionAccess values and causes an T:System.ArgumentException when used as the access parameter for the M:System.Security.Permissions.FileIOPermission.GetPathList(System.Security.Permissions.FileIOPermissionAccess) method, which expects a single value.

Definition at line 9 of file FileIOPermissionAccess.cs.

◆ HostProtectionResource

Specifies categories of functionality potentially harmful to the host if invoked by a method or class.

Enumerator
None 

Exposes no host resources.

Synchronization 

Exposes synchronization.

SharedState 

Exposes state that might be shared between threads.

ExternalProcessMgmt 

Might create or destroy other processes.

SelfAffectingProcessMgmt 

Might exit the current process, terminating the server.

ExternalThreading 

Creates or manipulates threads other than its own, which might be harmful to the host.

SelfAffectingThreading 

Manipulates threads in a way that only affects user code.

SecurityInfrastructure 

Exposes the security infrastructure.

UI 

Exposes the user interface.

MayLeakOnAbort 

Might cause a resource leak on termination, if not protected by a safe handle or some other means of ensuring the release of resources.

All 

Exposes all host resources.

Definition at line 9 of file HostProtectionResource.cs.

◆ IsolatedStorageContainment

Specifies the permitted use of isolated storage.

Enumerator
None 

Use of isolated storage is not allowed.

DomainIsolationByUser 

Storage is isolated first by user and then by domain and assembly. Storage is also isolated by computer. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store.

ApplicationIsolationByUser 

Storage is isolated first by user and then by application. Storage is also isolated by computer. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites.

AssemblyIsolationByUser 

Storage is isolated first by user and then by code assembly. Storage is also isolated by computer. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites.

DomainIsolationByMachine 

Storage is isolated first by computer and then by domain and assembly. Data can only be accessed within the context of the same application and only when run on the same computer. This is helpful when a third-party assembly wants to keep a private data store.

AssemblyIsolationByMachine 

Storage is isolated first by computer and then by code assembly. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites.

ApplicationIsolationByMachine 

Storage is isolated first by computer and then by application. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites.

DomainIsolationByRoamingUser 

Storage is isolated first by user and then by domain and assembly. Storage will roam if Windows user data roaming is enabled. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store.

AssemblyIsolationByRoamingUser 

Storage is isolated first by user and then by assembly evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites.

ApplicationIsolationByRoamingUser 

Storage is isolated first by user and then by application evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites.

AdministerIsolatedStorageByUser 

Unlimited administration ability for the user store. Allows browsing and deletion of the entire user store, but not read access other than the user's own domain/assembly identity.

UnrestrictedIsolatedStorage 

Use of isolated storage is allowed without restriction. Code has full access to any part of the user store, regardless of the identity of the domain or assembly. This use of isolated storage includes the ability to enumerate the contents of the isolated storage data store.

Definition at line 8 of file IsolatedStorageContainment.cs.

◆ KeyContainerPermissionFlags

Specifies the type of key container access allowed.

Enumerator
NoFlags 

No access to a key container.

Create 

Create a key container.

Open 

Open a key container and use the public key.

Delete 

Delete a key container.

Import 

Import a key into a key container.

Export 

Export a key from a key container.

Sign 

Sign a file using a key.

Decrypt 

Decrypt a key container.

ViewAcl 

View the access control list (ACL) for a key container.

ChangeAcl 

Change the access control list (ACL) for a key container.

AllFlags 

Create, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container.

Definition at line 9 of file KeyContainerPermissionFlags.cs.

◆ PermissionState

Specifies whether a permission should have all or no access to resources at creation.

Enumerator
Unrestricted 

Full access to the resource protected by the permission.

None 

No access to the resource protected by the permission.

Definition at line 8 of file PermissionState.cs.

◆ ReflectionPermissionFlag

Specifies the permitted use of the N:System.Reflection and N:System.Reflection.Emit namespaces.

Enumerator
NoFlags 

Enumeration of types and members is allowed. Invocation operations are allowed on visible types and members.

TypeInformation 

This flag is obsolete. No flags are necessary to enumerate types and members and to examine their metadata. Use F:System.Security.Permissions.ReflectionPermissionFlag.NoFlags instead.

MemberAccess 

Invocation operations on all members are allowed, regardless of grant set. If this flag is not set, invocation operations are allowed only on visible members.

ReflectionEmit 

Emitting debug symbols is allowed. Beginning with the .NET Framework 2.0 Service Pack 1, this flag is no longer required to emit code.

RestrictedMemberAccess 

Restricted member access is provided for partially trusted code. Partially trusted code can access nonpublic types and members, but only if the grant set of the partially trusted code includes all permissions in the grant set of the assembly that contains the nonpublic types and members being accessed. This flag is new in the .NET Framework 2.0 SP1.

AllFlags 

TypeInformation , MemberAccess, and ReflectionEmit are set. F:System.Security.Permissions.ReflectionPermissionFlag.AllFlags does not include F:System.Security.Permissions.ReflectionPermissionFlag.RestrictedMemberAccess.

Definition at line 9 of file ReflectionPermissionFlag.cs.

◆ RegistryPermissionAccess

Specifies the permitted access to registry keys and values.

Enumerator
NoAccess 

No access to registry variables. F:System.Security.Permissions.RegistryPermissionAccess.NoAccess represents no valid T:System.Security.Permissions.RegistryPermissionAccess values and causes an T:System.ArgumentException when used as the parameter for M:System.Security.Permissions.RegistryPermission.GetPathList(System.Security.Permissions.RegistryPermissionAccess), which expects a single value.

Read 

Read access to registry variables.

Write 

Write access to registry variables.

Create 

Create access to registry variables.

AllAccess 

F:System.Security.Permissions.RegistryPermissionAccess.Create, F:System.Security.Permissions.RegistryPermissionAccess.Read, and F:System.Security.Permissions.RegistryPermissionAccess.Write access to registry variables. F:System.Security.Permissions.RegistryPermissionAccess.AllAccess represents multiple T:System.Security.Permissions.RegistryPermissionAccess values and causes an T:System.ArgumentException when used as the access parameter for the M:System.Security.Permissions.RegistryPermission.GetPathList(System.Security.Permissions.RegistryPermissionAccess) method, which expects a single value.

Definition at line 9 of file RegistryPermissionAccess.cs.

◆ SecurityAction

Specifies the security actions that can be performed using declarative security.

Enumerator
Demand 

All callers higher in the call stack are required to have been granted the permission specified by the current permission object.

Assert 

The calling code can access the resource identified by the current permission object, even if callers higher in the stack have not been granted permission to access the resource (see Using the Assert Method).

Deny 

The ability to access the resource specified by the current permission object is denied to callers, even if they have been granted permission to access it (see Using the Deny Method).

PermitOnly 

Only the resources specified by this permission object can be accessed, even if the code has been granted permission to access other resources.

LinkDemand 

The immediate caller is required to have been granted the specified permission. Do not use in the .NET Framework 4. For full trust, use T:System.Security.SecurityCriticalAttribute instead; for partial trust, use F:System.Security.Permissions.SecurityAction.Demand.

InheritanceDemand 

The derived class inheriting the class or overriding a method is required to have been granted the specified permission..

RequestMinimum 

The request for the minimum permissions required for code to run. This action can only be used within the scope of the assembly.

RequestOptional 

The request for additional permissions that are optional (not required to run). This request implicitly refuses all other permissions not specifically requested. This action can only be used within the scope of the assembly.

RequestRefuse 

The request that permissions that might be misused will not be granted to the calling code. This action can only be used within the scope of the assembly.

Definition at line 8 of file SecurityAction.cs.

◆ SecurityPermissionFlag

Specifies access flags for the security permission object.

Enumerator
NoFlags 

No security access.

Assertion 

Ability to assert that all this code's callers have the requisite permission for the operation.

UnmanagedCode 

Ability to call unmanaged code.

SkipVerification 

Ability to skip verification of code in this assembly. Code that is unverifiable can be run if this permission is granted.

Execution 

Permission for the code to run. Without this permission, managed code will not be executed.

ControlThread 

Ability to use certain advanced operations on threads.

ControlEvidence 

Ability to provide evidence, including the ability to alter the evidence provided by the common language runtime.

ControlPolicy 

Ability to view and modify policy.

SerializationFormatter 

Ability to provide serialization services. Used by serialization formatters.

ControlDomainPolicy 

Ability to specify domain policy.

ControlPrincipal 

Ability to manipulate the principal object.

ControlAppDomain 

Ability to create and manipulate an T:System.AppDomain.

RemotingConfiguration 

Permission to configure Remoting types and channels.

Infrastructure 

Permission to plug code into the common language runtime infrastructure, such as adding Remoting Context Sinks, Envoy Sinks and Dynamic Sinks.

BindingRedirects 

Permission to perform explicit binding redirection in the application configuration file. This includes redirection of .NET Framework assemblies that have been unified as well as other assemblies found outside the .NET Framework.

AllFlags 

The unrestricted state of the permission.

Definition at line 9 of file SecurityPermissionFlag.cs.

◆ StorePermissionFlags

Specifies the permitted access to X.509 certificate stores.

Enumerator
NoFlags 

Permission is not given to perform any certificate or store operations.

CreateStore 

The ability to create a new store.

DeleteStore 

The ability to delete a store.

EnumerateStores 

The ability to enumerate the stores on a computer.

OpenStore 

The ability to open a store.

AddToStore 

The ability to add a certificate to a store.

RemoveFromStore 

The ability to remove a certificate from a store.

EnumerateCertificates 

The ability to enumerate the certificates in a store.

AllFlags 

The ability to perform all certificate and store operations.

Definition at line 6 of file StorePermissionFlags.cs.

◆ TypeDescriptorPermissionFlags

Defines permission settings for type descriptors.

Enumerator
NoFlags 

No permission flags are set on the type descriptor.

RestrictedRegistrationAccess 

The type descriptor may be called from partially trusted code.

Definition at line 6 of file TypeDescriptorPermissionFlags.cs.

◆ UIPermissionClipboard

Specifies the type of clipboard access that is allowed to the calling code.

Enumerator
NoClipboard 

Clipboard cannot be used.

OwnClipboard 

The ability to put data on the clipboard (Copy, Cut) is unrestricted. Intrinsic controls that accept Paste, such as text box, can accept the clipboard data, but user controls that must programmatically read the clipboard cannot.

AllClipboard 

Clipboard can be used without restriction.

Definition at line 8 of file UIPermissionClipboard.cs.

◆ UIPermissionWindow

Specifies the type of windows that code is allowed to use.

Enumerator
NoWindows 

Users cannot use any windows or user interface events. No user interface can be used.

SafeSubWindows 

Users can only use F:System.Security.Permissions.UIPermissionWindow.SafeSubWindows for drawing, and can only use user input events for user interface within that subwindow. Examples of F:System.Security.Permissions.UIPermissionWindow.SafeSubWindows are a T:System.Windows.Forms.MessageBox, common dialog controls, and a control displayed within a browser.

SafeTopLevelWindows 

Users can only use F:System.Security.Permissions.UIPermissionWindow.SafeTopLevelWindows and F:System.Security.Permissions.UIPermissionWindow.SafeSubWindows for drawing, and can only use user input events for the user interface within those top-level windows and subwindows.

AllWindows 

Users can use all windows and user input events without restriction.

Definition at line 8 of file UIPermissionWindow.cs.