Interface Registration Flags

The following constants are used in the Flags parameter of the RpcServerRegisterIf2 and RpcServerRegisterIfEx functions.

ConstantDescription
0

Standard interface semantics.

RPC_IF_ALLOW_CALLBACKS_WITH_NO_AUTH

When this interface flag is registered, the RPC runtime invokes the registered security callback for all calls, regardless of identity, protocol sequence, or authentication level of the client. This flag is allowed only when a security callback is registered.

Note  This flag is available starting with Windows XP with SP2 and Windows Server 2003 with SP1. When this flag is not set, RPC automatically filters all unauthenticated calls before they reach the security callback.

RPC_IF_ALLOW_LOCAL_ONLY

When this interface flag is registered, the RPC runtime rejects calls made by remote clients. All local calls using ncadg_* and ncacn_* protocol sequences are also rejected, with the exception of ncacn_np. RPC allows ncacn_NP calls only if the call does not come from SRV. Calls from ncalrpc are always processed.

Note  This flag is available starting with Windows XP with SP2 and Windows Server 2003 with SP1.

RPC_IF_AUTOLISTEN

This is an auto-listen interface. The run time begins listening for calls as soon as the first autolisten interface is registered, and stops listening when the last autolisten interface is unregistered.

RPC_IF_OLE

Reserved for OLE. Do not use this flag.

RPC_IF_ALLOW_UNKNOWN_AUTHORITY

Currently not implemented.

RPC_IF_ALLOW_SECURE_ONLY

Limits connections to clients that use an authorization level higher than RPC_C_AUTHN_LEVEL_NONE. Specifying this flag allows clients to come through on the NULL session. On Windows XP and Windows Server 2003, such clients are not allowed. Clients that fail the RPC_IF_ALLOW_SECURE_ONLY test receive an RPC_S_ACCESS_DENIED error. Using the RPC_IF_ALLOW_SECURE_ONLY flag does not imply or guarantee a high level of privilege on the part of the calling user. RPC only checks that the user has valid credentials; the calling user may be using the guest account or other low privileged accounts. Do not assume high privilege when RPC_IF_ALLOW_SECURE_ONLY is used.

Windows NT 4.0 and Windows Me/98/95:  

RPC_IF_SEC_NO_CACHE

Disables security callback caching, forcing a security callback for each RPC call on a given interface.

Note  This flag is available starting with Windows XP with SP2 and Windows Server 2003 with SP1.

Requirements

Minimum supported client

Windows 2000 Professional [desktop apps only]

Minimum supported server

Windows 2000 Server [desktop apps only]

Header

Rpcdce.h

 

 

Community Additions

ADD
Show:
© 2014 Microsoft