2.7 KiB
Effective access rights for files sample
Demonstrates the use of Authorization APIs to compute a user's effective access rights on a file or folder.The sample opens a command line and describes the various flags for setting up access claims.
Note The Windows-classic-samples repo contains a variety of code samples that exercise the various programming models, platforms, features, and components available in Windows and/or Windows Server. This repo provides a Visual Studio solution (SLN) file for each sample, along with the source files, assets, resources, and metadata needed to compile and run the sample. For more info about the programming models, platforms, languages, and APIs demonstrated in these samples, check out the documentation on the Windows Dev Center. This sample is provided as-is in order to indicate or demonstrate the functionality of the programming models and feature APIs for Windows and/or Windows Server.
This sample was created for Windows 8.1 and/or Windows Server 2012 R2 using Visual Studio 2013, but in many cases it will run unaltered using later versions. This sample was created for Windows 8.1 and/or Windows Server 2012 R2 using Visual Studio 2013, but in many cases it will run unaltered using later versions. Please provide feedback on this sample!
To get a copy of Windows, go to Downloads and tools.
To get a copy of Visual Studio, go to Visual Studio Downloads.
Operating system requirements
Client
Windows 8.1
Server
Windows Server 2012 R2
Build the sample
To build this sample, open the EffectiveAccess.sln solution file in Visual Studio 2013 for Windows 8.1 (any SKU) or later versions of Visual Studio and Windows. Press F7 (or F6 for Visual Studio 2013) or go to Build->Build Solution from the top menu after the sample has loaded.
Run the sample
To run this sample after building it, press F5 (run with debugging enabled) or Ctrl-F5 (run without debugging enabled) from Visual Studio for Windows 8.1 (any SKU) or later versions of Visual Studio and Windows. (Or select the corresponding options from the Debug menu.) When executed without any command line options, the output will contain a description of the usage of the tool. To be able to exercise the options involving user or device claims, you will need to run this in an environment where claim types have been defined for the forest and have access to resources with access policy either stipulated by conditional ACLs on the resource itself or by means of a Central Policy that applies to the resource.