Runtime Settings Schema
Updated: May 2011
Runtime settings specify how the common language runtime handles garbage collection and the version of an assembly to use in configuration files.
Specifies that the Windows identity always flows across asynchronous points, regardless of how impersonation was performed.
Specifies the assembly that provides the application domain manager for the default application domain in the process.
Specifies the type that serves as the application domain manager for the default application domain.
Instructs the runtime to collect statistics on all application domains in the process for the life of the process.
Contains information about assembly version redirection and the locations of assemblies.
Contains identifying information about an assembly.
Redirects one assembly version to another.
Specifies whether strong name verification for trusted assemblies should be bypassed.
Specifies where the runtime can find an assembly.
Specifies that the runtime should use legacy sorting behavior when performing string comparisons
Encapsulates binding policy and assembly location for each assembly.
Specifies whether the runtime searches for assemblies in directories specified by the DEVPATH environment variable.
Specifies whether the caching of binding failures, which is the default behavior in the .NET Framework version 2.0, is disabled.
Specifies whether the full thread stack is committed when a thread starts.
Specifies whether the default behavior, which is to allow the runtime host to override configuration settings for an application domain, is disabled.
Specifies whether to enforce a computer configuration requirement that cryptographic algorithms must comply with the Federal Information Processing Standards (FIPS).
Specifies whether to enable event tracing for Windows (ETW) for common language runtime events.
Specifies whether the runtime runs garbage collection concurrently.
Specifies whether the common language runtime runs server garbage collection.
Specifies whether the runtime uses code access security (CAS) publisher policy.
Specifies whether the runtime uses legacy code access security (CAS) policy.
Specifies whether the common language runtime allows managed code to catch access violations and other corrupted state exceptions.
Specifies that the Windows identity does not flow across user-defined asynchronous points.
Specifies whether assemblies from remote sources are loaded as full trust.
Specifies that the runtime will use COM interop instead of remoting across application domain boundaries.
Specifies subdirectories that the runtime searches when loading assemblies.
Specifies whether the runtime applies publisher policy.
Specifies the full name of the assembly that should be dynamically loaded when a partial name is used.
Contains information about assembly binding and the behavior of garbage collection.
Specifies whether shadow copying uses the default startup behavior introduced in the .NET Framework version 4, or reverts to the startup behavior of earlier versions of the .NET Framework.
Specifies that an application can reference the same assembly in two different implementations of the .NET Framework, by disabling the default behavior that treats the assemblies as equivalent for application portability purposes.
Specifies whether the runtime uses legacy formatting for TimeSpan values.
Requests that the runtime use explicit stack sizes when it creates certain threads that it uses internally, instead of the default stack size.