ISecurityChangedEventHandler.RemoveAccessControlLists Method
Allows the implementer to override, block or listen for RemoveAccessControlLists calls.
Namespace: Microsoft.TeamFoundation.Framework.Server
Assembly: Microsoft.TeamFoundation.Framework.Server (in Microsoft.TeamFoundation.Framework.Server.dll)
Syntax
'Declaration
Function RemoveAccessControlLists ( _
requestContext As TeamFoundationRequestContext, _
notificationType As NotificationType, _
securityTokens As IEnumerable(Of String), _
recurse As Boolean _
) As Boolean
bool RemoveAccessControlLists(
TeamFoundationRequestContext requestContext,
NotificationType notificationType,
IEnumerable<string> securityTokens,
bool recurse
)
bool RemoveAccessControlLists(
TeamFoundationRequestContext^ requestContext,
NotificationType notificationType,
IEnumerable<String^>^ securityTokens,
bool recurse
)
abstract RemoveAccessControlLists :
requestContext:TeamFoundationRequestContext *
notificationType:NotificationType *
securityTokens:IEnumerable<string> *
recurse:bool -> bool
function RemoveAccessControlLists(
requestContext : TeamFoundationRequestContext,
notificationType : NotificationType,
securityTokens : IEnumerable<String>,
recurse : boolean
) : boolean
Parameters
requestContext
Type: Microsoft.TeamFoundation.Framework.Server.TeamFoundationRequestContextThe request context associated with this call.
notificationType
Type: Microsoft.TeamFoundation.Framework.Server.NotificationTypeThe type of notification that this is.
securityTokens
Type: System.Collections.Generic.IEnumerable<String>The tokens whose ACLs should be removed.
recurse
Type: System.BooleanTrue if all of the children under the provided token should also be removed. Note that this parameter only will be used for namespaces with hierarchical structure.
Return Value
Type: System.Boolean
True if the operation should continue in the security namespace this notification is coming from.
.NET Framework Security
- Full trust for the immediate caller. This member cannot be used by partially trusted code. For more information, see Using Libraries from Partially Trusted Code.