Was this page helpful?
Your feedback about this content is important. Let us know what you think.
Additional feedback?
1500 characters remaining
KeyContainerPermissionFlags Enumeration
Collapse the table of content
Expand the table of content

KeyContainerPermissionFlags Enumeration

Specifies the type of key container access allowed.

This enumeration has a FlagsAttribute attribute that allows a bitwise combination of its member values.

Namespace:  System.Security.Permissions
Assembly:  mscorlib (in mscorlib.dll)

public enum KeyContainerPermissionFlags

Member nameDescription
AllFlagsCreate, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container.
ChangeAclChange the access control list (ACL) for a key container.
CreateCreate a key container.

Creating a key container also creates a file on disk. It is very important that any key container that is created is removed when it is no longer in use.

DecryptDecrypt a key container.

Decryption is a privileged operation because it uses the private key.

DeleteDelete a key container.

Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key. Therefore, deletion is a privileged operation.

ExportExport a key from a key container.

The ability to export a key is potentially harmful because it removes the exclusivity of the key.

ImportImport a key into a key container.

The ability to import a key can be as harmful as the ability to delete a container because importing a key into a named key container replaces the existing key.

NoFlagsNo access to a key container.
OpenOpen a key container and use the public key.

Open does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files. Only the owner of the key is able to decrypt these files using the private key.

SignSign a file using a key.

The ability to sign a file is potentially harmful because it can allow a user to sign a file using another user's key.

ViewAclView the access control list (ACL) for a key container.

This enumeration is used by members of the KeyContainerPermissionAccessEntry class.

Caution noteCaution

Many of these flags can have powerful effects and should be granted only to highly trusted code.

The most powerful of the flags are Create, Delete, Import, Export, Sign, Decrypt, and AllFlags. For specific threats that the use of these flags can present, see the member descriptions.

The following code example shows the use of the KeyContainerPermissionFlags enumeration.

// Create a KeyContainerPermission with the right  
// to open the key container.
KeyContainerPermission keyContainerPerm = new

.NET Framework

Supported in: 4.6, 4.5, 4, 3.5, 3.0, 2.0

.NET Framework Client Profile

Supported in: 4, 3.5 SP1
© 2015 Microsoft