ServiceAuthorizationManager Class
Collapse the table of content
Expand the table of content

ServiceAuthorizationManager Class


Provides authorization access checking for service operations.

Namespace:   System.ServiceModel
Assembly:  System.ServiceModel (in System.ServiceModel.dll)


public class ServiceAuthorizationManager


Initializes a new instance of the ServiceAuthorizationManager class.


Checks authorization for the given operation context.

System_CAPS_pubmethodCheckAccess(OperationContext, Message)

Checks authorization for the given operation context when access to a message is required.


Checks authorization for the given operation context based on default policy evaluation.


Determines whether the specified object is equal to the current object.(Inherited from Object.)


Allows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection.(Inherited from Object.)


Gets the set of policies that participate in policy evaluation.


Serves as the default hash function. (Inherited from Object.)


Gets the Type of the current instance.(Inherited from Object.)


Creates a shallow copy of the current Object.(Inherited from Object.)


Returns a string that represents the current object.(Inherited from Object.)

This class is responsible for evaluating all policies (rules that define what a user is allowed to do), comparing the policies to claims made by a client, setting the resulting AuthorizationContext to the ServiceSecurityContext, and providing the authorization decision whether to allow or deny access for a given service operation for a caller.

The CheckAccessCore method is called by the Windows Communication Foundation (WCF) infrastructure each time an attempt to access a resource is made. The method returns true or false to allow or deny access, respectively.

The ServiceAuthorizationManager is part of the WCFIdentity Model infrastructure. The Identity Model enables you to create custom authorization policies and custom authorization schemes. For more information about how the Identity Model works, see Managing Claims and Authorization with the Identity Model.

This class does not perform any authorization and allows users to access all service operations. To provide more restrictive authorization, you must create a custom authorization manager that checks custom policies. To do this, inherit from this class and override the CheckAccessCore method. Specify the instance of the derived class through the ServiceAuthorizationManager property.

In CheckAccessCore, the application can use the OperationContext object to access the caller identity (ServiceSecurityContext).

By getting the IncomingMessageHeaders property, which returns a MessageHeaders object, the application can access the service (To), and the operation (Action).

By getting the RequestContext property, which returns a RequestContext object, the application can access the entire request message (RequestMessage) and perform the authorization decision accordingly.

For an example, see How to: Create a Custom Authorization Manager for a Service.

To create custom authorization policies, implement the IAuthorizationPolicy class. For an example, see How to: Create a Custom Authorization Policy.

To create a custom claim, use the Claim class. For an example, see How to: Create a Custom Claim. To compare custom claims, you must compare claims, as shown in How to: Compare Claims.

For more information, seeCustom Authorization.

You can set the type of a custom authorization manager using the <serviceAuthorization> element in a client application configuration file.

The following example shows a class named MyServiceAuthorizationManager that inherits from the ServiceAuthorizationManager and overrides the CheckAccessCore method.

 public class MyServiceAuthorizationManager : ServiceAuthorizationManager
protected override bool CheckAccessCore(OperationContext operationContext)
  // Extract the action URI from the OperationContext. Match this against the claims
  // in the AuthorizationContext.
  string action = operationContext.RequestContext.RequestMessage.Headers.Action;

  // Iterate through the various claim sets in the AuthorizationContext.
  foreach(ClaimSet cs in operationContext.ServiceSecurityContext.AuthorizationContext.ClaimSets)
	// Examine only those claim sets issued by System.
	if (cs.Issuer == ClaimSet.System)
	  // Iterate through claims of type "".
           foreach (Claim c in cs.FindClaims("", Rights.PossessProperty))
		// If the Claim resource matches the action URI then return true to allow access.
		if (action == c.Resource.ToString())
		  return true;

  // If this point is reached, return false to deny access.
  return false;                 

.NET Framework
Available since 3.0

Any public static (Shared in Visual Basic) members of this type are thread safe. Any instance members are not guaranteed to be thread safe.

Return to top
© 2015 Microsoft