Muokkaa

Jaa


LockPermissions Table

The LockPermissions Table is used to secure individual portions of an application in a locked-down environment. It can be used with the installation of files, registry keys, and created folders.

A package intended for installation in Windows Server 2008 R2 or Windows 7 should use the MsiLockPermissionsEx Table rather than the LockPermissions Table. Windows Installer versions earlier than Windows Installer 5.0 ignore the MsiLockPermissionsEx Table. Windows Installer 5.0 can install a package that contains the LockPermissions Table. Beginning with Windows Installer 5.0, installation of a package that contains both the MsiLockPermissionsEx Table and the LockPermissions Table fails and returns Windows Installer error message 1941.

The LockPermissions Table has the following columns.

Column Type Key Nullable
LockObject Identifier Y N
Table Text Y N
Domain Formatted Y Y
User Formatted Y N
Permission DoubleInteger N Y

 

Columns

LockObject

This column and the Table column together specify the file, directory, or registry key that is to be secured. The LockObject column is a foreign key that points to the primary key of the table specified by the Table column.

Table

This column and the LockObject column specify the file, directory, or registry key that is to be secured. In the Table column, enter File, Registry, or CreateFolder to specify a LockObject listed in the File Table, Registry Table, or CreateFolder Table.

Domain

The column that identifies the domain of the user for which permissions are to be set. This is the name of a stand-alone machine or a domain name. The column data type is Formatted, and you may use the string [%USERDOMAIN] in this field to get the value of the USERDOMAIN environment variable for the current domain. To get any other domain requires using Custom Actions. For more information, see the Custom Action Table.

User

The column that identifies the localized name of the user for which permissions are to be set. This name must be located on the machine or domain. The installation fails if the machine or domain controller does not recognize the domain and user combination or if the user's security identifier (SID) cannot be retrieved. Multiple users can be specified for a single LockObject.

The common user names "Everyone" and "Administrators" may be entered in English and are mapped to well-known SIDs. LocalSystem is given full control in all security descriptors created through the LockPermissions Table. You can use the ComputerName Property, LogonUser Property or USERNAME Property in this field to get the current user. A custom action is required to enter the localized name of any other user or group.

You can use multiple records with identical LockObject and Table entries (but different User entries) to specify access control lists for multiple users.

Permission

The column that identifies the integer description of system privileges. The following gives the most commonly used values (a complete list exists in Winnt.h).

Privilege Description
GENERIC_ALL
0X10000000
268435456
Read, write, and execute access
GENERIC_EXECUTE
0X20000000
536870912
Execute access
GENERIC_WRITE
0X40000000
1073741824
Write access

 

You cannot specify GENERIC_READ in the Permission column. Attempting to do so will fail. Instead, you must specify a value such as KEY_READ or FILE_GENERIC_READ.

Null entered in this column is reserved for future use.

Remarks

The InstallFiles, WriteRegistryValues, and CreateFolders actions in sequence tables process the information in this table. For information about using sequence tables, see Using a Sequence Table.

Permission can only be set in the LockPermissions Table for users that already exist on the computer or domain. An attempt to set permissions for an unknown user causes the installation to fail, even if that user account is created during the installation by a deferred custom action.

It is recommended that the system administrator's local group be included in all access control lists (ACL). This ensures that the system administrator can access and maintain objects.

Every file, registry key, or directory that is listed in the LockPermissions Table receives an explicit security descriptor, whether it replaces an existing object or not. The Windows Installer attempts to preserve the security on objects that already exist on the system. If an object is not listed in the LockPermissions Table, and replaces an existing object, the replacement gets the security settings of the object that it replaces.

If an object is not listed in the LockPermissions Table, and does not replace an existing object, it receives no explicit security descriptor. The access to the new object is based on the attributes of its parent or container object. If an object is not listed in the table, and replaces an object with no explicit security descriptor, the access to the new object is based on the attributes of its parent or container object.

The Windows Installer sets the UserSID property to the security identifier (SID) or the user running the installation.

Validation

ICE03
ICE06
ICE46
ICE55