Rediģēt

Kopīgot, izmantojot


Windows Forms Security

Windows Forms features a security model that is code-based (security levels are set for code, regardless of the user running the code). This is in addition to any security schemas that may be in place already on your computer system. These can include those in the browser (such as the zone-based security available in Internet Explorer) or the operating system (such as the credential-based security of Windows NT).

In This Section

Security in Windows Forms Overview
Briefly explains the .NET Framework security model and the basic steps necessary to ensure the Windows Forms in your application are secure.

More Secure File and Data Access in Windows Forms
Describes how to access files and data in a semi-trusted environment.

More Secure Printing in Windows Forms
Describes how to access printing features in a semi-trusted environment.

Additional Security Considerations in Windows Forms
Describes performing window manipulation, using the Clipboard, and making calls to unmanaged code in a semi-trusted environment.

Default Security Policy
Lists the default permissions granted in the Full Trust, Local Intranet, and Internet permission sets.

General Security Policy Administration
Gives information about the administering the .NET Framework security policy and elevating permissions.

Dangerous Permissions and Policy Administration
Discusses some of the.NET Framework permissions that can potentially allow the security system to be circumvented.

Secure Coding Guidelines
Links to topics that explain the best practices for securely writing code against the .NET Framework.

Requesting Permissions
Discusses the use of attributes to let the runtime know what permissions your code needs to run.

Key Security Concepts
Links to topics that cover the basic aspects of code security.

Code Access Security Basics
Discusses the basics of working with the .NET Framework run time security policy.

Determining When to Modify Security Policy
Explains how to determine when your applications need to diverge from the default security policy.

Deploying Security Policy
Discusses the best manner for deploying security policy changes.