.NET Framework 4.5.2+
.NET Framework 4.5.2+
.NET Standard 2.0+
.NET Core 3.0+

SecurityStrategy Properties

An abstract base class for Security Strategies.
Name Description
AllowAnonymousAccess Specifies if users can access all secured data anonymously before they log in.
AnonymousAllowedTypes Specifies types that users can access anonymously before they log in.
AssociationPermissionsMode Specifies the mode of processing security permissions for associations.
CanRaiseEvents protected Gets a value indicating whether the component can raise an event. Inherited from Component.
Container Gets the IContainer that contains the Component. Inherited from Component.
DelayPermissionDictionaryLoading static For internal use.
DesignMode protected Gets a value that indicates whether the Component is currently in design mode. Inherited from Component.
EnableSecurityForActions static For internal use.
Events protected Gets the list of event handlers that are attached to this Component. Inherited from Component.
PermissionsReloadMode Specifies the mode of reloading the security permissions used by Security Adapters.
RolesMergingMode Specifies how the Security System determines if a user can perform a specific operation when this user has multiple roles with different permission sets.
SaveUserObjectOnPasswordChanging Specifies whether or not changes in a Detail View should be saved when the ResetPassword or ChangeMyPassword Action is executed.
SecuredNonPersistentTypes static Obsolete. This property is now obsolete. Use the SecurityStrategy.AdditionalSecuredTypes property instead.
Site Gets or sets the ISite of the Component. Inherited from Component.
SupportNavigationPermissionsForTypes Specifies whether or not the navigation permissions are supported for types.
TraceLevel static Specifies the trace level for logs.
UseOptimizedPermissionRequestProcessor For internal use.
UsePermissionRequestProcessor For internal use.
UserId An identifier of the current user.
UserName Gets the current user name.
UserType Specifies the type of user that is supported by the security strategy.
See Also