System.Security namespaces for UWP apps
The System.Security its children namespaces (System.Security.Authentication, System.Security.Authentication.ExtendedProtection,System.Security.Claims) contain classes that represent the .NET Framework security system and permissions.
This topic displays the types in the System.Security and System.Security.Principal namespaces that are included in .NET for UWP apps. Note that .NET for UWP apps does not include all the members of each type. For information about individual types, see the linked topics. The documentation for a type indicates which members are included in .NET for UWP apps.
Types supported in .NET for UWP apps | Description |
|---|---|
Allows an assembly to be called by partially trusted code. Without this declaration, only fully trusted callers are able to use the assembly. This class cannot be inherited. | |
Specifies that code or an assembly performs security-critical operations. | |
The exception that is thrown when a security error is detected. | |
Identifies types or members as security-critical and safely accessible by transparent code. | |
Specifies that an assembly cannot cause an elevation of privilege. | |
The exception that is thrown when the security policy requires code to be type safe and the verification process is unable to verify that the code is type safe. |
Types supported in the .NET for UWP apps | Description |
|---|---|
Defines the possible cipher algorithms for the SslStream class. | |
Specifies the algorithm used to create keys shared by the client and server. | |
Specifies the algorithm used for generating message authentication codes (MACs). | |
Defines the possible versions of SslProtocols. |
Types supported in the .NET for UWP apps | Description |
|---|---|
The ChannelBinding class encapsulates a pointer to the opaque data used to bind an authenticated transaction to a secure channel. | |
The ChannelBindingKind enumeration represents the kinds of channel bindings that can be queried from secure channels. |
Types supported in the .NET for UWP apps | Description |
|---|---|
Represents a claim. | |
Represents a claims-based identity. | |
An IPrincipal implementation that supports multiple claims-based identities. | |
Defines constants for the well-known claim types that can be assigned to a subject. This class cannot be inherited. | |
Defines claim value types according to the type URIs defined by W3C and OASIS. This class cannot be inherited. |
Types supported in the .NET for UWP apps | Description |
|---|---|
Represents the abstract base class from which all implementations of the Advanced Encryption Standard (AES) must inherit. | |
Represents Abstract Syntax Notation One (ASN.1)-encoded data. | |
Represents the abstract base class from which all implementations of asymmetric algorithms must inherit. | |
Specifies the block cipher mode to use for encryption. | |
Encapsulates the name of an encryption algorithm. | |
Encapsulates the name of an encryption algorithm group. | |
Specifies the key export policies for a key. | |
Defines the core functionality for keys that are used with Cryptography Next Generation (CNG) objects. | |
Specifies a key BLOB format for use with Microsoft Cryptography Next Generation (CNG) objects. | |
Specifies options used for key creation. | |
Contains advanced properties for key creation. | |
Specifies options for opening key handles. | |
Specifies options for opening a key. | |
Specifies the cryptographic operations that a Cryptography Next Generation (CNG) key may be used with. | |
Encapsulates a property of a Cryptography Next Generation (CNG) key or provider. | |
Provides a strongly typed collection of Cryptography Next Generation (CNG) properties. | |
Specifies Cryptography Next Generation (CNG) key property options. | |
Encapsulates the name of a key storage provider (KSP) for use with Cryptography Next Generation (CNG) objects. | |
Encapsulates optional configuration parameters for the user interface (UI) that Cryptography Next Generation (CNG) displays when you access a protected key. | |
Specifies the protection level for the key in user interface (UI) prompting scenarios. | |
The exception that is thrown when an error occurs during a cryptographic operation. | |
Defines a stream that links data streams to cryptographic transformations. | |
Specifies the mode of a cryptographic stream. | |
Represents the abstract base class from which all classes that derive byte sequences of a specified length inherit. | |
Represents the base class from which all implementations of cryptographic hash algorithms must derive. | |
Specifies the name of a cryptographic hash algorithm. | |
Represents the abstract class from which all implementations of Hash-based Message Authentication Code (HMAC) must derive. | |
Computes a Hash-based Message Authentication Code (HMAC) using the SHA1 hash function. | |
Computes a Hash-based Message Authentication Code (HMAC) by using the SHA256 hash function. | |
Computes a Hash-based Message Authentication Code (HMAC) using the SHA384 hash function. | |
Computes a Hash-based Message Authentication Code (HMAC) using the SHA512 hash function. | |
Defines the basic operations of cryptographic transformations. | |
Represents the abstract class from which all implementations of keyed hash algorithms must derive. | |
Determines the set of valid key sizes for the symmetric cryptographic algorithms. | |
Represents the abstract class from which all implementations of the MD5 hash algorithm inherit. | |
Represents a cryptographic object identifier. This class cannot be inherited. | |
Represents a collection of Oid objects. This class cannot be inherited. | |
Provides the ability to navigate through an OidCollection object. This class cannot be inherited. | |
Identifies Windows cryptographic object identifier (OID) groups. | |
Specifies the type of padding to apply when the message data block is shorter than the full number of bytes needed for a cryptographic operation. | |
Represents the abstract class from which all implementations of cryptographic random number generators derive. | |
Implements password-based key derivation functionality; PBKDF2; by using a pseudo-random number generator based on HMACSHA1. | |
Represents the base class from which all implementations of the RSA algorithm inherit. | |
Provides a Cryptography Next Generation (CNG) implementation of the RSA algorithm. | |
Specifies the padding mode and parameters to use with RSA encryption or decryption operations. | |
Specifies the padding mode to use with RSA encryption or decryption operations. | |
Represents the standard parameters for the RSA algorithm. | |
Specifies the padding mode and parameters to use with RSA signature creation or verification operations. | |
Specifies the padding mode to use with RSA signature creation or verification operations. | |
Computes the SHA1 hash for the input data. | |
Computes the SHA256 hash for the input data. | |
Computes the SHA384 hash for the input data. | |
Computes the SHA512 hash for the input data. | |
Represents the abstract base class from which all implementations of symmetric algorithms must inherit. |
Types supported in the .NET for UWP apps | Description |
|---|---|
Specifies the way to open the X.509 certificate store. | |
Represents a certificate's public key information. This class cannot be inherited. | |
Provides extension methods for retrieving RSA implementations for the public and private keys of an X509Certificate2. | |
Specifies the location of the X.509 certificate store. | |
Specifies the name of the X.509 certificate store to open. | |
Represents the distinguished name of an X509 certificate. This class cannot be inherited. | |
Specifies characteristics of the X.500 distinguished name. | |
Defines the constraints set on a certificate. This class cannot be inherited. | |
Provides methods that help you use X.509 v.3 certificates. | |
Represents an X.509 certificate. | |
Represents a collection of X509Certificate2 objects. This class cannot be inherited. | |
Supports a simple iteration over a X509Certificate2Collection object. This class cannot be inherited. | |
Defines a collection that stores X509Certificate objects. | |
Represents a chain-building engine for X509Certificate2 certificates. | |
Represents an element of an X.509 chain. | |
Represents a collection of X509ChainElement objects. This class cannot be inherited. | |
Supports a simple iteration over an X509ChainElementCollection. This class cannot be inherited. | |
Represents the chain policy to be applied when building an X509 certificate chain. This class cannot be inherited. | |
Provides a simple structure for storing X509 chain status and error information. | |
Defines the status of an X509 chain. | |
Specifies the format of an X.509 certificate. | |
Defines the collection of object identifiers (OIDs) that indicates the applications that use the key. This class cannot be inherited. | |
Represents an X509 extension. | |
Represents a collection of X509Extension objects. This class cannot be inherited. | |
Supports a simple iteration over a X509ExtensionCollection. This class cannot be inherited. | |
Specifies the type of value the X509Certificate2Collection.Find method searches for. | |
Defines where and how to import the private key of an X.509 certificate. | |
Defines the usage of a key contained within an X.509 certificate. This class cannot be inherited. | |
Defines how the certificate key can be used. If this value is not defined; the key can be used for any purpose. | |
Specifies the type of name the X509 certificate contains. | |
Specifies which X509 certificates in the chain should be checked for revocation. | |
Specifies the mode used to check for X509 certificate revocation. | |
Represents an X.509 store; which is a physical store where certificates are persisted and managed. This class cannot be inherited. | |
Defines a string that identifies a certificate's subject key identifier (SKI). This class cannot be inherited. | |
Defines the type of hash algorithm to use with the X509SubjectKeyIdentifierExtension class. | |
Specifies conditions under which verification of certificates in the X509 chain should be conducted. |
Types supported in the .NET for UWP apps | Description |
|---|---|
Represents a generic user. | |
Represents a generic principal. | |
Defines the basic functionality of an identity object. | |
Defines the basic functionality of a principal object. | |
Defines security impersonation levels. Security impersonation levels govern the degree to which a server process can act on behalf of a client process. |