|
BlackBytes Security for .NET
Implements managed role-based security for .NET Framework. The Security
for .NET enables you to manage Windows security. The .NET, like any other
application run on Windows, is subject to operating system security restrictions.
Windows protects access to system objects using security descriptors.
System objects include registry keys, files, and directories and printing
services, etc. If you want an application to access any of Windows securable
objects, you must make sure that both Code Access Security policy and
the DACL settings grant the appropriate access permissions, both to the
assembly (or assemblies) constituting the application as well as the user
or users you want to be able to run it.
Software Information |
System Requirements |
Version: |
1.2 |
- Windows 98/2000/XP/NT/ME/vista
- Disk Space Required: 60MB
- Memory Required: 64MB
- Software Required: Microsoft .NET Framework 1.0 and later
|
License: | Free to try, $139.00 to buy |
File Size: |
7951 KB |
Rating : | |
Key Features of BlackBytes Security for .NET:
- Microsoft .NET, C#, C++.Managed, VB.NET, ASP.NET and VS.NET compatible
- Adjust one or more group flags that control group usage within an access token
- Create copy of an existing token
- Retrieve statistics information about an access token
- Identify the source of an access token
- Determine whether a SID appears within an access token and whether is enabled
- Create a restricted access token
- Enumerate available privileges within an access token
- Enable or disable groups present in an access token
- Impersonate a client to access thread's access token
- Check an access token against the security descriptor of an object
- Retrieve and control the security descriptor of an object
- Support addition or removing ACEs to/from an ACL
- Enable to create a copy of an ACL
- Provide automatic proper ACE order in a DACL after modification
- Enable to create a new DACL with ACEs
- Copy all ACEs from a DACL to a new DACL
- Support object-specific ACEs
- Merge a DACL to a new security descriptor
- Enable to set a null DACL of an object
- Enable to set an empty DACL of an object
- Inject a new security descriptor to an object
- Read or set an object's SACL
- Enable to create a new security descriptor and attach it to an object at creation time
- Serialize security descriptor to a xml or binary file
- Enable to modify a DACL or replace a DACL with a new one
- Control who can perform specific operations on an object
- Control who has access to a specific property, or set of properties, of an object
- Create an ACE that grants permissions to a security group, rather than to a single user
- Validate consistence of a security identifier
- Convert a user's or groups's textual name to a SID
- Convert a SID to the trustee's textual name
- Convert to and from binary and string representations of a SID
- Build-up a well-known SID from scratch that exist on all systems and indicate accounts such as Guest or Everyone
- Enable to cache frequently used SID and this way reduce network traffic
- Serialize SID cache to a file
- Enable, disable or remove privileges in/from an access token
- Enumerate an access token privileges
- Convert privilege name to human-readable form
- Retrieve privilege's luid
- Determine whether a privilege is enabled in an access token
- Retrieve trustee's membership in an access token
- Determine whether a security descriptor allows access to a trustee
- Determine maximum access permissions, that a security descriptor grants to trustee
- Enumerate trusted domains
- Enumerate accounts on a domain
- Assign or remove privilege to/from an account
- Create, load or delete an user profile
- Retrieve profile specific directory path
- Determine type of profile
- Provide information about typical aspects of LSA on a system
- Enumerate logon rights and privileges assigned to an account
- Manage auditing policy
- Lock memory against unauthorized access from the other processes
- Hold truly secret data in memory and to clean it up when disposing of it
- Fill memory by zeros when an object is redundant
- Provide methods that typically only a user with the same logon credential as the encrypter can decrypt the data
- 100% managed code written in C#
- Object oriented design specifically for the .NET framework
- All error handling through .NET exceptions
- Comprehensive Visual Studio .NET style documentation
- VB.NET, C# and C++.Managed example source code
- Includes 12 months free email support and minor release upgrades
- Royalty free runtime
RELATED SOFTWARE DOWNLOADS FOR BLACKBYTES SECURITY FOR .NET
|
|