This documentation is archived and is not being maintained.

Windows Forms Security

Windows Forms features a security model that is code-based (security levels are set for code, regardless of the user running the code). This is in addition to any security schemas that may be in place already on your computer system. These can include those in the browser (such as the zone-based security available in Internet Explorer) or the operating system (such as the credential-based security of Windows NT).

Security in Windows Forms Overview

Briefly explains the .NET Framework security model and the basic steps necessary to ensure the Windows Forms in your application are secure.

More Secure File and Data Access in Windows Forms

Describes how to access files and data in a semi-trusted environment.

More Secure Printing in Windows Forms

Describes how to access printing features in a semi-trusted environment.

Additional Security Considerations in Windows Forms

Describes performing window manipulation, using the Clipboard, and making calls to unmanaged code in a semi-trusted environment.

Default Security Policy

Lists the default permissions granted in the Full Trust, Local Intranet, and Internet permission sets.

General Security Policy Administration

Gives information about the administering the .NET Framework security policy and elevating permissions.

Dangerous Permissions and Policy Administration

Discusses some of the.NET Framework permissions that can potentially allow the security system to be circumvented.

Secure Coding Guidelines

Links to topics that explain the best practices for securely writing code against the .NET Framework.

Requesting Permissions

Discusses the use of attributes to let the runtime know what permissions your code needs to run.

Key Security Concepts

Links to topics that cover the basic aspects of code security.

Code Access Security Basics

Discusses the basics of working with the .NET Framework run time security policy.

Determining When to Modify Security Policy

Explains how to determine when your applications need to diverge from the default security policy.

Deploying Security Policy

Discusses the best manner for deploying security policy changes.