Code:
/ Dotnetfx_Vista_SP2 / Dotnetfx_Vista_SP2 / 8.0.50727.4016 / DEVDIV / depot / DevDiv / releases / whidbey / NetFxQFE / ndp / clr / src / BCL / System / Security / Principal / WindowsPrincipal.cs / 1 / WindowsPrincipal.cs
// ==++== // // Copyright (c) Microsoft Corporation. All rights reserved. // // ==--== // // WindowsPrincipal.cs // // Group membership checks. // namespace System.Security.Principal { using Microsoft.Win32; using Microsoft.Win32.SafeHandles; using System.Runtime.InteropServices; using System.Security.Permissions; using Hashtable = System.Collections.Hashtable; [Serializable] [ComVisible(true)] public enum WindowsBuiltInRole { Administrator = 0x220, User = 0x221, Guest = 0x222, PowerUser = 0x223, AccountOperator = 0x224, SystemOperator = 0x225, PrintOperator = 0x226, BackupOperator = 0x227, Replicator = 0x228 } [Serializable()] [HostProtection(SecurityInfrastructure=true)] [ComVisible(true)] public class WindowsPrincipal : IPrincipal { private WindowsIdentity m_identity = null; // Following 3 fields are present purely for serialization compatability with Everett: not used in Whidbey #pragma warning disable 169 private String[] m_roles; private Hashtable m_rolesTable; private bool m_rolesLoaded; #pragma warning restore 169 // // Constructors. // private WindowsPrincipal () {} public WindowsPrincipal (WindowsIdentity ntIdentity) { if (ntIdentity == null) throw new ArgumentNullException("ntIdentity"); m_identity = ntIdentity; } // // Properties. // public virtual IIdentity Identity { get { return m_identity; } } // // Public methods. // public virtual bool IsInRole (string role) { if (role == null || role.Length == 0) return false; NTAccount ntAccount = new NTAccount(role); IdentityReferenceCollection source = new IdentityReferenceCollection(1); source.Add(ntAccount); IdentityReferenceCollection target = NTAccount.Translate(source, typeof(SecurityIdentifier), false); SecurityIdentifier sid = target[0] as SecurityIdentifier; if (sid == null) return false; return IsInRole(sid); } public virtual bool IsInRole (WindowsBuiltInRole role) { if (role < WindowsBuiltInRole.Administrator || role > WindowsBuiltInRole.Replicator) throw new ArgumentException(Environment.GetResourceString("Arg_EnumIllegalVal", (int)role), "role"); return IsInRole((int) role); } public virtual bool IsInRole (int rid) { SecurityIdentifier sid = new SecurityIdentifier(IdentifierAuthority.NTAuthority, new int[] {Win32Native.SECURITY_BUILTIN_DOMAIN_RID, rid}); return IsInRole(sid); } // This methods (with a SID parameter) is more general than the 2 overloads that accept a WindowsBuiltInRole or // a rid (as an int). It is also better from a performance standpoint than the overload that accepts a string. // The aformentioned overloads remain in this class since we do not want to introduce a // breaking change. However, this method should be used in all new applications and we should document this. [ComVisible(false)] public virtual bool IsInRole (SecurityIdentifier sid) { if (sid == null) throw new ArgumentNullException("sid"); // special case the anonymous identity. if (m_identity.TokenHandle.IsInvalid) return false; // CheckTokenMembership expects an impersonation token SafeTokenHandle token = SafeTokenHandle.InvalidHandle; if (m_identity.ImpersonationLevel == TokenImpersonationLevel.None) { if (!Win32Native.DuplicateTokenEx(m_identity.TokenHandle, (uint) TokenAccessLevels.Query, IntPtr.Zero, (uint) TokenImpersonationLevel.Identification, (uint) TokenType.TokenImpersonation, ref token)) throw new SecurityException(Win32Native.GetMessage(Marshal.GetLastWin32Error())); } bool isMember = false; // CheckTokenMembership will check if the SID is both present and enabled in the access token. if (!Win32Native.CheckTokenMembership((m_identity.ImpersonationLevel != TokenImpersonationLevel.None ? m_identity.TokenHandle : token), sid.BinaryForm, ref isMember)) throw new SecurityException(Win32Native.GetMessage(Marshal.GetLastWin32Error())); token.Dispose(); return isMember; } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // ==++== // // Copyright (c) Microsoft Corporation. All rights reserved. // // ==--== // // WindowsPrincipal.cs // // Group membership checks. // namespace System.Security.Principal { using Microsoft.Win32; using Microsoft.Win32.SafeHandles; using System.Runtime.InteropServices; using System.Security.Permissions; using Hashtable = System.Collections.Hashtable; [Serializable] [ComVisible(true)] public enum WindowsBuiltInRole { Administrator = 0x220, User = 0x221, Guest = 0x222, PowerUser = 0x223, AccountOperator = 0x224, SystemOperator = 0x225, PrintOperator = 0x226, BackupOperator = 0x227, Replicator = 0x228 } [Serializable()] [HostProtection(SecurityInfrastructure=true)] [ComVisible(true)] public class WindowsPrincipal : IPrincipal { private WindowsIdentity m_identity = null; // Following 3 fields are present purely for serialization compatability with Everett: not used in Whidbey #pragma warning disable 169 private String[] m_roles; private Hashtable m_rolesTable; private bool m_rolesLoaded; #pragma warning restore 169 // // Constructors. // private WindowsPrincipal () {} public WindowsPrincipal (WindowsIdentity ntIdentity) { if (ntIdentity == null) throw new ArgumentNullException("ntIdentity"); m_identity = ntIdentity; } // // Properties. // public virtual IIdentity Identity { get { return m_identity; } } // // Public methods. // public virtual bool IsInRole (string role) { if (role == null || role.Length == 0) return false; NTAccount ntAccount = new NTAccount(role); IdentityReferenceCollection source = new IdentityReferenceCollection(1); source.Add(ntAccount); IdentityReferenceCollection target = NTAccount.Translate(source, typeof(SecurityIdentifier), false); SecurityIdentifier sid = target[0] as SecurityIdentifier; if (sid == null) return false; return IsInRole(sid); } public virtual bool IsInRole (WindowsBuiltInRole role) { if (role < WindowsBuiltInRole.Administrator || role > WindowsBuiltInRole.Replicator) throw new ArgumentException(Environment.GetResourceString("Arg_EnumIllegalVal", (int)role), "role"); return IsInRole((int) role); } public virtual bool IsInRole (int rid) { SecurityIdentifier sid = new SecurityIdentifier(IdentifierAuthority.NTAuthority, new int[] {Win32Native.SECURITY_BUILTIN_DOMAIN_RID, rid}); return IsInRole(sid); } // This methods (with a SID parameter) is more general than the 2 overloads that accept a WindowsBuiltInRole or // a rid (as an int). It is also better from a performance standpoint than the overload that accepts a string. // The aformentioned overloads remain in this class since we do not want to introduce a // breaking change. However, this method should be used in all new applications and we should document this. [ComVisible(false)] public virtual bool IsInRole (SecurityIdentifier sid) { if (sid == null) throw new ArgumentNullException("sid"); // special case the anonymous identity. if (m_identity.TokenHandle.IsInvalid) return false; // CheckTokenMembership expects an impersonation token SafeTokenHandle token = SafeTokenHandle.InvalidHandle; if (m_identity.ImpersonationLevel == TokenImpersonationLevel.None) { if (!Win32Native.DuplicateTokenEx(m_identity.TokenHandle, (uint) TokenAccessLevels.Query, IntPtr.Zero, (uint) TokenImpersonationLevel.Identification, (uint) TokenType.TokenImpersonation, ref token)) throw new SecurityException(Win32Native.GetMessage(Marshal.GetLastWin32Error())); } bool isMember = false; // CheckTokenMembership will check if the SID is both present and enabled in the access token. if (!Win32Native.CheckTokenMembership((m_identity.ImpersonationLevel != TokenImpersonationLevel.None ? m_identity.TokenHandle : token), sid.BinaryForm, ref isMember)) throw new SecurityException(Win32Native.GetMessage(Marshal.GetLastWin32Error())); token.Dispose(); return isMember; } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- DiffuseMaterial.cs
- DbException.cs
- VectorKeyFrameCollection.cs
- ViewValidator.cs
- TraceUtility.cs
- FormsAuthenticationUser.cs
- WebPartsPersonalizationAuthorization.cs
- DelayedRegex.cs
- XPathScanner.cs
- HtmlInputCheckBox.cs
- InputScopeAttribute.cs
- NumericUpDownAccelerationCollection.cs
- PbrsForward.cs
- DynamicPropertyHolder.cs
- SqlCacheDependencySection.cs
- CellQuery.cs
- BaseCollection.cs
- PathFigure.cs
- Int32.cs
- SegmentInfo.cs
- SocketCache.cs
- SafeProcessHandle.cs
- BrowserCapabilitiesFactoryBase.cs
- ForAllOperator.cs
- RegexInterpreter.cs
- FileEnumerator.cs
- ExpressionBuilderContext.cs
- TableLayoutCellPaintEventArgs.cs
- ServiceObjectContainer.cs
- RSACryptoServiceProvider.cs
- MultiAsyncResult.cs
- HostingEnvironmentException.cs
- FormatStringEditor.cs
- SessionSwitchEventArgs.cs
- AudioFormatConverter.cs
- MenuItemStyleCollection.cs
- SqlInternalConnection.cs
- BoundPropertyEntry.cs
- DataViewManager.cs
- XmlQueryStaticData.cs
- InlineCollection.cs
- XPathNodeHelper.cs
- regiisutil.cs
- Facet.cs
- DeviceContext2.cs
- FrameworkTextComposition.cs
- SolidColorBrush.cs
- HostProtectionPermission.cs
- Models.cs
- SafeRightsManagementPubHandle.cs
- SchemeSettingElementCollection.cs
- IndentedWriter.cs
- ObjectManager.cs
- DummyDataSource.cs
- StylusPointProperties.cs
- TextBoxBase.cs
- AttachmentCollection.cs
- TextRunTypographyProperties.cs
- TreeNodeSelectionProcessor.cs
- HttpChannelBindingToken.cs
- Rss20FeedFormatter.cs
- JsonServiceDocumentSerializer.cs
- safesecurityhelperavalon.cs
- WebPartZoneCollection.cs
- SourceInterpreter.cs
- MachineSettingsSection.cs
- OrCondition.cs
- DrawingGroupDrawingContext.cs
- Qualifier.cs
- EdmFunctionAttribute.cs
- ScrollViewer.cs
- IDQuery.cs
- DbDataAdapter.cs
- RangeValidator.cs
- OptimizedTemplateContent.cs
- Identifier.cs
- Group.cs
- WindowsRebar.cs
- HtmlEncodedRawTextWriter.cs
- UrlParameterWriter.cs
- MetafileHeaderWmf.cs
- VisemeEventArgs.cs
- PathFigure.cs
- MetafileHeader.cs
- SyndicationSerializer.cs
- XmlSchemaCompilationSettings.cs
- LogicalMethodInfo.cs
- ResXResourceReader.cs
- BitmapMetadataEnumerator.cs
- EventOpcode.cs
- HitTestWithPointDrawingContextWalker.cs
- ExceptionHandlers.cs
- PermissionRequestEvidence.cs
- Item.cs
- XPathDocument.cs
- TileBrush.cs
- EdmScalarPropertyAttribute.cs
- CellTreeNodeVisitors.cs
- PropertyRecord.cs
- SerializationFieldInfo.cs