Windows Forms Security
Windows Forms features a security model that is code-based (security levels are set for code, regardless of the user running the code). This is in addition to any security schemas that may be in place already on your computer system. These can include those in the browser (such as the zone-based security available in Internet Explorer) or the operating system (such as the credential-based security of Windows NT).
In This Section
- Introduction to Security In Windows Forms
- Briefly explains the .NET Framework security model and the basic steps necessary to ensure the Windows Forms in your application are secure.
- Secure File and Data Access in Windows Forms
- Describes how to access files and data in a semi-trusted environment.
- Secure Printing in Windows Forms
- Describes how to access printing features in a semi-trusted environment.
- Additional Security Considerations in Windows Forms
- Describes performing window manipulation, using the Clipboard, and making calls to unmanaged code in a semi-trusted environment.
- Default Security Policy
- Lists the default permissions granted in the Full Trust, Local Intranet, and Internet permission sets.
- General Security Policy Administration
- Gives information about the administering the .NET Framework security policy and elevating permissions.
- Dangerous Permissions and Policy Administration
- Discusses some of the.NET Framework permissions that can potentially allow the security system to be circumvented.
- Secure Coding Guidelines
- Links to topics that explain the best practices for securely writing code against the .NET Framework.
- Requesting Permissions
- Discusses the use of attributes to let the runtime know what permissions your code needs to run.
- Key Security Concepts
- Links to topics that cover the basic aspects of code security.
- Code Access Security Basics
- Discusses the basics of working with the .NET Framework run time security policy.
- Determining When to Modify Security Policy
- Explains how to determine when your applications need to diverge from the default security policy.
- Increasing Permissions
- Explains how to increase the permissions granted to your application's assemblies.
- Deploying Security Policy
- Discusses the best manner for deploying security policy changes.