Security Page, Project Designer
The Security page of the Project Designer is used to configure code access security settings for applications that are deployed using ClickOnce deployment. For more information, see.
To access the Security page, select a project node in Solution Explorer, then on the Project menu, click Properties. When the Project Designer appears, click the Security tab.
- Enable ClickOnce Security Settings
Determines whether security settings are enabled at design time. When this option is unchecked, all other options on the Security page are unavailable.
When publishing an application by means of the Publish wizard, this option is automatically enabled.
When the check box for this option is checked, you have the choice of selecting one of two option buttons: This is a full trust application or This is a partial trust application.
- This is a full trust application
If you check this option, the application receives Full Trust permissions when it is installed or run on a client computer. Full Trust is the default option, but you should avoid using this option if possible, as your application will be granted unrestricted access to resources such as the file system and the registry.
- This is a partial trust application
If you check this option, the application receives Partial Trust permissions when it is installed or run on a client computer. Partial Trust means that the code access security permissions for your application include only those permissions required by your application. For more information on configuring security permissions, see.
You can specify the Partial Trust security settings using the options in the ClickOnce Security Permissions area.
ClickOnce Security Permissions
- Zone your application will be installed from
Specifies a default set of code-access security permissions to use as a starting point when configuring permissions. Choose (Custom) to start with no permissions enabled, or Internet or Local Intranet for a restricted permission set.
You should always customize the permission set to include only those permissions required by your application. For more information, see.
- Permissions required by the application
Contains a table of code security permissions.
The Included column contains a green check-mark icon for any permissions that are included, or a yellow warning icon if the permission included is not included by default in the specified security zone.
The Permission column contains the names of all permission sets; permission sets that have been modified are displayed in bold text.
The Setting column contains a drop-down list with three choices: choosing Include will include the permission, choosing Exclude will exclude it, and choosing (Zone Default) will include or exclude it based on the value selected in the Zone your application will be deployed from list.
- Calculate Permissions
Launches the Permission Calculator tool, which analyzes your application and sets the permissions in the Permissions required by the application table based on the results. For more information, see.
Choosing this option will overwrite any existing permission settings.
Opens thefor the selected permission set in the Permissions required by the application table. The options available in the dialog vary by permission set.
Resets all permissions in the Permissions required by the application table to the default values for the zone selected in the Zone your application will be installed from list.
Opens the, which is used to configure settings for debugging the application with restricted permissions.