Documentation for this section has not yet been entered.
Many of these flags are powerful and permit access to key containers that should only be granted to highly trusted code.
The most powerful of the flags are KeyContainerPermissionFlags.Create, KeyContainerPermissionFlags.Delete, KeyContainerPermissionFlags.Import, KeyContainerPermissionFlags.Export, KeyContainerPermissionFlags.Sign, KeyContainerPermissionFlags.Decrypt, and KeyContainerPermissionFlags.AllFlags. For specific threats posed by the use of these flags, see individual flag descriptions.