संपादित करें

इसके माध्यम से साझा किया गया


SecurityManager.PolicyHierarchy Method

Definition

Caution

This API is now deprecated.

Caution

This method is obsolete and will be removed in a future release of the .NET Framework. See http://go.microsoft.com/fwlink/?LinkID=155570 for more information.

Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy.

public:
 static System::Collections::IEnumerator ^ PolicyHierarchy();
[System.Obsolete]
public static System.Collections.IEnumerator PolicyHierarchy ();
public static System.Collections.IEnumerator PolicyHierarchy ();
[System.Obsolete("This method is obsolete and will be removed in a future release of the .NET Framework. See http://go.microsoft.com/fwlink/?LinkID=155570 for more information.")]
public static System.Collections.IEnumerator PolicyHierarchy ();
[<System.Obsolete>]
static member PolicyHierarchy : unit -> System.Collections.IEnumerator
static member PolicyHierarchy : unit -> System.Collections.IEnumerator
[<System.Obsolete("This method is obsolete and will be removed in a future release of the .NET Framework. See http://go.microsoft.com/fwlink/?LinkID=155570 for more information.")>]
static member PolicyHierarchy : unit -> System.Collections.IEnumerator
Public Shared Function PolicyHierarchy () As IEnumerator

Returns

An enumerator for PolicyLevel objects that compose the security policy hierarchy.

Attributes

Exceptions

This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element.

The code that calls this method does not have ControlPolicy.

Remarks

The returned enumerator provides successive PolicyLevel objects that represent the policy at the respective (machine, user, enterprise, application domain) level of the hierarchy. These objects are the live policy objects; altering these objects can have unpredictable results.

Minimum policy hierarchy consists of a machine level, an enterprise level, and a user level. However, the hierarchy can include additional levels.

Applies to