System.Security.Principal.WindowsBuiltInRole Enumeration

Specifies common roles to be used with WindowsPrincipal.IsInRole(string).


public enum WindowsBuiltInRole


These roles represent the local Windows groups common to most installations of Windows NT, Windows 2000 and Windows XP.


In Windows Vista, User Account Control (UAC) determines the privileges of a user. If you are a member of the Built-in Administrators group, you are assigned two run-time access tokens: a standard user access token and an administrator access token. By default, you are in the standard user role. When you attempt to perform a task that requires administrative privileges, you can dynamically elevate your role by using the Consent dialog box. The code that executes the erload:System.Security.Principal.WindowsPrincipal.IsInRole method does not display the Consent dialog box. The code returns false if you are in the standard user role, even if you are in the Built-in Administrators group. You can elevate your privileges before you execute the code by right-clicking the application icon and indicating that you want to run as an administrator.


Member NameDescription

Account operators manage the user accounts on a computer or domain.


Administrators have complete and unrestricted access to the computer or domain.


Backup operators can override security restrictions for the sole purpose of backing up or restoring files.


Guests are more restricted than users.


Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications.


Print operators can take control of a printer.


Replicators support file replication in a domain.


System operators manage a particular computer.


Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications.


Namespace: System.Security.Principal
Assembly: mscorlib (in mscorlib.dll)
Assembly Versions: 1.0.5000.0,,