Assembly: mscorlib (in mscorlib.dll)
Thetype exposes the following members.
|BinaryLength||Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the access control list (ACL) into a binary array by using the GetBinaryForm method. (Overrides GenericAcl.BinaryLength.)|
|Count||Gets the number of access control entries (ACEs) in the current object. (Overrides GenericAcl.Count.)|
|IsCanonical||Gets a Boolean value that specifies whether the access control entries (ACEs) in the current object are in canonical order.|
|IsContainer||Sets whether the object is a container.|
|IsDS||Sets whether the current object is a directory object access control list (ACL).|
|IsSynchronized||This property is always set to false. It is implemented only because it is required for the implementation of the ICollection interface. (Inherited from GenericAcl.)|
|Item||Gets or sets the CommonAce at the specified index. (Overrides GenericAcl.Item.)|
|Revision||Gets the revision level of the . (Overrides GenericAcl.Revision.)|
|SyncRoot||This property always returns null. It is implemented only because it is required for the implementation of the ICollection interface. (Inherited from GenericAcl.)|
|CopyTo||Copies each GenericAce of the current GenericAcl into the specified array. (Inherited from GenericAcl.)|
|Equals(Object)||Determines whether the specified object is equal to the current object. (Inherited from Object.)|
|Finalize||Allows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection. (Inherited from Object.)|
|GetBinaryForm||Marshals the contents of the object into the specified byte array beginning at the specified offset. (Overrides GenericAcl.GetBinaryForm(Byte, Int32).)|
|GetEnumerator||Returns a new instance of the AceEnumerator class. (Inherited from GenericAcl.)|
|GetHashCode||Serves as the default hash function. (Inherited from Object.)|
|GetType||Gets the Type of the current instance. (Inherited from Object.)|
|MemberwiseClone||Creates a shallow copy of the current Object. (Inherited from Object.)|
|Purge||Removes all access control entries (ACEs) contained by this object that are associated with the specified SecurityIdentifier object.|
|RemoveInheritedAces||Removes all inherited access control entries (ACEs) from this object.|
|ToString||Returns a string that represents the current object. (Inherited from Object.)|
Certain combinations of inheritance and access mask flags are meaningless:
Any access control entry (ACE) with a zero-access mask is removed.
Inherit-only ACEs inside object ACLs are removed.
On DACLs, SystemAudit and SystemAlarm ACEs are removed.
On system access control lists (SACLs), AccessAllowed and AccessDenied ACEs are removed.
Canonical order is maintained according to the following algorithm:
Explicit ACEs take precedence over inherited ACEs; this rule applies to both DACLs and SACLs.
In DACLs, among the explicit ACEs, ACEs that deny access take precedence over ACEs that allow access. For directory object ACLs, the nonobject ACEs come before object ACEs.
All common ACEs take precedence over noncommon ACEs.
Inherited ACEs maintain their relative order after canonicity.
Unrecognized and custom ACEs are disallowed in both DACLs and SACLs.
Within contiguous ranges (explicit AccessDenied and AccessAllowed ACEs on DACLs, all explicit ACEs on SACLs), the ACEs are sorted by using the CompareTo methods of the SecurityIdentifier objects associated with the ACEs.
Adjacent ACEs are combined, if appropriate. This reduces the size of the ACL without affecting the access control semantics it grants.
Windows Phone 8.1, Windows Phone 8, Windows 8.1, Windows Server 2012 R2, Windows 8, Windows Server 2012, Windows 7, Windows Vista SP2, Windows Server 2008 (Server Core Role not supported), Windows Server 2008 R2 (Server Core Role supported with SP1 or later; Itanium not supported)
The .NET Framework does not support all versions of every platform. For a list of the supported versions, see .NET Framework System Requirements.