Compartilhar via


CryptographySettingsManageabilityProvider Members

Include Protected Members
Include Inherited Members

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The CryptographySettingsManageabilityProvider type exposes the following members.

Constructors

  Name Description
Public method CryptographySettingsManageabilityProvider

This method supports the Enterprise Library Manageability Extensions infrastructure and is not intended to be used directly from your code.

Initializes a new instance of the CryptographySettingsManageabilityProvider class with a given set of manageability providers to use when dealing with the configuration hash and symmetric cryptography providers.

Methods

  Name Description
Protected method AddAdministrativeTemplateDirectives Overloaded.
Protected method AddElementsPolicies<T>
Adds the ADM instructions that describe the policies that can be used to override the configuration information for the elements in a collection of configuration elements, using the registered element manageability providers for each element.
(Inherited from ConfigurationSectionManageabilityProvider.)
Public method Equals (Inherited from Object.)
Protected method Finalize (Inherited from Object.)
Protected method GenerateWmiObjectsForConfigurationSection
Creates the ConfigurationSetting instances that describe the configurationSection.
(Inherited from ConfigurationSectionManageabilityProviderBase<T>.)
Public method GetHashCode (Inherited from Object.)
Protected method GetSubProvider
Returns the ConfigurationElementManageabilityProvider instance registered for type configurationObjectType.
(Inherited from ConfigurationSectionManageabilityProvider.)
Public method GetType (Inherited from Object.)
Protected method LogExceptionWhileOverriding
Logs an error detected while overriding a configuration object with policy values.
(Inherited from ConfigurationSectionManageabilityProvider.)
Protected method MemberwiseClone (Inherited from Object.)
Protected method OverrideWithGroupPoliciesAndGenerateWmiObjects
Overrides the configurationObject's and its internal configuration elements' properties with the Group Policy values from the registry, if any, and creates the ConfigurationSetting instances that describe the configuration.
(Inherited from ConfigurationSectionManageabilityProviderBase<T>.)
Protected method OverrideWithGroupPoliciesAndGenerateWmiObjectsForConfigurationElements
Overrides the configurationSection's configuration elements' properties with the Group Policy values from the registry, if any, and creates the ConfigurationSetting instances that describe these configuration elements.
(Inherited from ConfigurationSectionManageabilityProviderBase<T>.)
Protected method OverrideWithGroupPoliciesAndGenerateWmiObjectsForElementCollection<T>
Overrides the properties for the configuration elements in the given collection, and creates the ConfigurationSetting instances that describe each element.
(Inherited from ConfigurationSectionManageabilityProvider.)
Protected method OverrideWithGroupPoliciesForConfigurationSection
Overrides the configurationSection's properties with the Group Policy values from the registry.
(Inherited from ConfigurationSectionManageabilityProviderBase<T>.)
Public method ToString (Inherited from Object.)

Properties

  Name Description
Protected property SectionCategoryName
Gets the name of the category that represents the whole configuration section.
(Inherited from ConfigurationSectionManageabilityProviderBase<T>.)
Protected property SectionName
Gets the name of the managed configuration section.
(Inherited from ConfigurationSectionManageabilityProviderBase<T>.)

See Also

CryptographySettingsManageabilityProvider Class

Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.Configuration.Manageability Namespace

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.