KeyContainerPermissionFlags
Create a key container.
Creating a key container also creates a file on disk. It is very important that any key container that is created is removed when it is no longer in use.
Decrypt a key container.
Decryption is a privileged operation because it uses the private key.
Delete a key container.
Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key. Therefore, deletion is a privileged operation.
Export a key from a key container.
The ability to export a key is potentially harmful because it removes the exclusivity of the key.
Import a key into a key container.
The ability to import a key can be as harmful as the ability to delete a container because importing a key into a named key container replaces the existing key.
Open a key container and use the public key.
Open does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files. Only the owner of the key is able to decrypt these files using the private key.
Sign a file using a key.
The ability to sign a file is potentially harmful because it can allow a user to sign a file using another user's key.