Specifies the type of key container access allowed.
This enumeration has a FlagsAttribute attribute that allows a bitwise combination of its member values.
Assembly: mscorlib (in mscorlib.dll)
|Create, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container.|
|Change the access control list (ACL) for a key container.|
|Create a key container.|
Creating a key container also creates a file on disk. It is very important that any key container that is created is removed when it is no longer in use.
|Decrypt a key container.|
Decryption is a privileged operation because it uses the private key.
|Delete a key container.|
Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key. Therefore, deletion is a privileged operation.
|Export a key from a key container.|
The ability to export a key is potentially harmful because it removes the exclusivity of the key.
|Import a key into a key container.|
The ability to import a key can be as harmful as the ability to delete a container because importing a key into a named key container replaces the existing key.
|No access to a key container.|
|Open a key container and use the public key.|
Open does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files. Only the owner of the key is able to decrypt these files using the private key.
|Sign a file using a key.|
The ability to sign a file is potentially harmful because it can allow a user to sign a file using another user's key.
|View the access control list (ACL) for a key container.|
This enumeration is used by members of the KeyContainerPermissionAccessEntry class.
Many of these flags can have powerful effects and should be granted only to highly trusted code.
The most powerful of the flags are , , , , , , and . For specific threats that the use of these flags can present, see the member descriptions.