Many of these access permissions pose potential security and privacy threats. Great care should be taken in granting access to stores. A brief description of the type of threat exposed by an access can be found in the summary for the access.
The ability to add a certificate to a store.
The ability to perform all certificate and store operations.
The ability to create a new store.
The ability to delete a store.
The ability to enumerate the certificates in a store.
The ability to enumerate the stores on a computer.
Permission is not given to perform any certificate or store operations.
The ability to open a store.
The ability to remove a certificate from a store.