Assembly: mscorlib (in mscorlib.dll)
Thetype exposes the following members.
|BinaryLength||Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the access control list (ACL) into a binary array by using the GetBinaryForm method. (Overrides GenericAcl.BinaryLength.)|
|Count||Gets the number of access control entries (ACEs) in the current object. (Overrides GenericAcl.Count.)|
|IsCanonical||Gets a Boolean value that specifies whether the access control entries (ACEs) in the current object are in canonical order.|
|IsContainer||Sets whether the object is a container.|
|IsDS||Sets whether the current object is a directory object access control list (ACL).|
|IsSynchronized||This property is always set to false. It is implemented only because it is required for the implementation of the ICollection interface. (Inherited from GenericAcl.)|
|Item||Gets or sets the CommonAce at the specified index. (Overrides GenericAcl.Item.)|
|Revision||Gets the revision level of the . (Overrides GenericAcl.Revision.)|
|SyncRoot||This property always returns null. It is implemented only because it is required for the implementation of the ICollection interface. (Inherited from GenericAcl.)|
|CopyTo||Copies each GenericAce of the current GenericAcl into the specified array. (Inherited from GenericAcl.)|
|Equals(Object)||Determines whether the specified object is equal to the current object. (Inherited from Object.)|
|Finalize||Allows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection. (Inherited from Object.)|
|GetBinaryForm||Marshals the contents of the object into the specified byte array beginning at the specified offset. (Overrides GenericAcl.GetBinaryForm(Byte, Int32).)|
|GetEnumerator||Retrieves an object that you can use to iterate through the access control entries (ACEs) in an access control list (ACL). (Inherited from GenericAcl.)|
|GetHashCode||Serves as the default hash function. (Inherited from Object.)|
|GetType||Gets the Type of the current instance. (Inherited from Object.)|
|MemberwiseClone||Creates a shallow copy of the current Object. (Inherited from Object.)|
|Purge||Removes all access control entries (ACEs) contained by this object that are associated with the specified SecurityIdentifier object.|
|RemoveInheritedAces||Removes all inherited access control entries (ACEs) from this object.|
|ToString||Returns a string that represents the current object. (Inherited from Object.)|
Certain combinations of inheritance and access mask flags are meaningless:
Any access control entry (ACE) with a zero-access mask is removed.
Inherit-only ACEs inside object ACLs are removed.
On DACLs, SystemAudit and SystemAlarm ACEs are removed.
On system access control lists (SACLs), AccessAllowed and AccessDenied ACEs are removed.
Canonical order is maintained according to the following algorithm:
Explicit ACEs take precedence over inherited ACEs; this rule applies to both DACLs and SACLs.
In DACLs, among the explicit ACEs, ACEs that deny access take precedence over ACEs that allow access. For directory object ACLs, the nonobject ACEs come before object ACEs.
All common ACEs take precedence over noncommon ACEs.
Inherited ACEs maintain their relative order after canonicity.
Unrecognized and custom ACEs are disallowed in both DACLs and SACLs.
Within contiguous ranges (explicit AccessDenied and AccessAllowed ACEs on DACLs, all explicit ACEs on SACLs), the ACEs are sorted by using the CompareTo methods of the SecurityIdentifier objects associated with the ACEs.
Adjacent ACEs are combined, if appropriate. This reduces the size of the ACL without affecting the access control semantics it grants.