PUAF enumeration

Contains the flags passed into the IInternetSecurityManager::ProcessUrlAction method.

Syntax

typedef enum  { 
  PUAF_DEFAULT                       = 0x0000000,
  PUAF_NOUI                          = 0x00000001,
  PUAF_ISFILE                        = 0x00000002,
  PUAF_WARN_IF_DENIED                = 0x00000004,
  PUAF_FORCEUI_FOREGROUND            = 0x00000008,
  PUAF_CHECK_TIFS                    = 0x00000010,
  PUAF_DONTCHECKBOXINDIALOG          = 0x00000020,
  PUAF_TRUSTED                       = 0x00000040,
  PUAF_ACCEPT_WILDCARD_SCHEME        = 0x00000080,
  PUAF_ENFORCERESTRICTED             = 0x00000100,
  PUAF_NOSAVEDFILECHECK              = 0x00000200,
  PUAF_REQUIRESAVEDFILECHECK         = 0x00000400,
  PUAF_DONT_USE_CACHE                = 0x00001000,
  PUAF_LMZ_UNLOCKED                  = 0x00010000,
  PUAF_LMZ_LOCKED                    = 0x00020000,
  PUAF_DEFAULTZONEPOL                = 0x00040000,
  PUAF_NPL_USE_LOCKED_IF_RESTRICTED  = 0x00080000,
  PUAF_NOUIIFLOCKED                  = 0x00100000,
  PUAF_DRAGPROTOCOLCHECK             = 0x00200000
} PUAF;

Constants

  • PUAF_DEFAULT
    Use the defaults associated with the action.

  • PUAF_NOUI
    Do not display any user interface.

  • PUAF_ISFILE
    Assume the URL is a file. The protocol scheme, "file://", is not required.

  • PUAF_WARN_IF_DENIED
    Warn the user that a URL action was denied.

  • PUAF_FORCEUI_FOREGROUND
    Force the user interface to be displayed in the foreground.

  • PUAF_CHECK_TIFS
    Obsolete. Do not use.

  • PUAF_DONTCHECKBOXINDIALOG
    Reserved.

  • PUAF_TRUSTED
    Indicates that the call is coming from a trusted source and implies that the policy returned should be the lowest security level possible. The default security manager will not honor this flag, but custom security managers may choose to honor it. This value was introduced for Internet Explorer 5.

  • PUAF_ACCEPT_WILDCARD_SCHEME
    Indicates that the security manager should accept wildcards in the URL scheme. This value was introduced for Internet Explorer 5.

  • PUAF_ENFORCERESTRICTED
    Force the URL into the Restricted Zone.

  • PUAF_NOSAVEDFILECHECK
    Internet Explorer 6 for Windows XP SP2 and later. Do not check the file for "saved from url" information.

  • PUAF_REQUIRESAVEDFILECHECK
    Internet Explorer 6 for Windows XP SP2 and later. Force the file to be checked for "saved from url" information.

  • PUAF_DONT_USE_CACHE
    Internet Explorer 7. Do not use the IInternetSecurityManager::MapUrlToZone zone cache. Recompute the zone instead.

  • PUAF_LMZ_UNLOCKED
    Internet Explorer 6 for Windows XP SP2 and later. Return policy values for the Local Machine zone when running in the Local Machine Lockdown zone.

  • PUAF_LMZ_LOCKED
    Internet Explorer 6 for Windows XP SP2 and later. Return policy values for the Local Machine Lockdown zone when running in the Local Machine Lockdown zone.

  • PUAF_DEFAULTZONEPOL
    Internet Explorer 6 for Windows XP SP2 and later. Return unlocked security zone policies when the protocol is restricted in the current zone.

  • PUAF_NPL_USE_LOCKED_IF_RESTRICTED
    Internet Explorer 6 for Windows XP SP2 and later. Return locked security zone policies when the protocol is restricted in the current zone.

  • PUAF_NOUIIFLOCKED
    Internet Explorer 6 for Windows XP SP2 and later. Disable the display of UI when running in a locked zone.

  • PUAF_DRAGPROTOCOLCHECK
    Internet Explorer 6 for Windows XP SP2 and later. Verify that the link protocol can be dropped into the Address bar when processing the URLACTION_SHELL_MOVE_OR_COPY action. The page hosting the script is used to determine the zone when querying if a given protocol is allowed.

Requirements

Minimum supported client

Windows XP

Minimum supported server

Windows 2000 Server

Product

Internet Explorer 4.0

Header

Urlmon.h