SqlRoleProvider::FindUsersInRole Method (String^, String^)
Gets an array of user names in a role where the user name contains the specified user name to match.
Assembly: System.Web (in System.Web.dll)
public: virtual array<String^>^ FindUsersInRole( String^ roleName, String^ usernameToMatch ) override
Parameters
- roleName
-
Type:
System::String^
The role to search in.
- usernameToMatch
-
Type:
System::String^
The user name to search for.
Return Value
Type: array<System::String^>^A string array containing the names of all the users where the user name matches usernameToMatch and the user is a member of the specified role.
| Exception | Condition |
|---|---|
| System::ArgumentNullException | roleName is null (Nothing in Visual Basic). -or- usernameToMatch is null. |
| System::ArgumentException | roleName is an empty string or contains a comma. -or- usernameToMatch is an empty string. -or- roleName is longer than 256 characters. -or- usernameToMatch is longer than 256 characters. |
| System.Configuration.Provider::ProviderException | roleName was not found in the database. -or- An unknown error occurred while communicating with the database. |
The FindUsersInRole method is called by the Roles class and returns a list of users in a role where the user name contains a match of the supplied usernameToMatch for the configured applicationName. The SqlRoleProvider searches for a user name that matches the usernameToMatch parameter value using the LIKE keyword and supports SQL Server wildcard characters. For example, if the usernameToMatch parameter is set to "user1", then membership information for the user with the user name of "user1" is returned, if it exists. If the usernameToMatch parameter is set to "user%", then membership information for users with the user name of "user1", "user2", "user_admin", and so on are returned.
The following code example uses the FindUsersInRole method to display role membership based on user input. For an example of a Web.config file that enables role management, see Roles.
Security Note
|
|---|
This example contains a text box that accepts user input, which is a potential security threat. By default, ASP.NET Web pages validate that user input does not include script or HTML elements. For more information, see Script Exploits Overview. |
Available since 2.0
.jpeg?cs-save-lang=1&cs-lang=cpp)