1 write to credentials
System.DirectoryServices.AccountManagement (1)
System\DirectoryServices\AccountManagement\AD\ADStoreCtx.cs (1)
294this.credentials = new NetCred(username, password);
25 references to credentials
System.DirectoryServices.AccountManagement (25)
System\DirectoryServices\AccountManagement\AD\ADAMStoreCtx.cs (4)
267using (DirectoryEntry deRoot = new DirectoryEntry("LDAP://" + userSuppliedServerName + "/rootDSE", credentials?.UserName, credentials?.Password, authTypes)) 278using (DirectoryEntry deSCN = new DirectoryEntry("LDAP://" + userSuppliedServerName + "/" + SchemaNamingContext, credentials?.UserName, credentials?.Password, authTypes))
System\DirectoryServices\AccountManagement\AD\ADStoreCtx.cs (21)
32protected internal NetCred Credentials { get { return this.credentials; } } 372this.credentials, 673this.credentials, 979SDSUtils.WriteAttribute(de.Path, attribute, value, this.credentials, this.authTypes); 988SDSUtils.WriteAttribute<T>(de.Path, attribute, value, this.credentials, this.authTypes); 1192Forest forest = Forest.GetForest(new DirectoryContext(DirectoryContextType.Forest, this.DnsForestName, this.credentials?.UserName, this.credentials?.Password)); 1194DirectoryContext dc = new DirectoryContext(DirectoryContextType.Domain, this.DnsDomainName, this.credentials?.UserName, this.credentials?.Password); 1213roots.Add(new DirectoryEntry("GC://" + gc.Name + "/" + p.DistinguishedName, this.credentials?.UserName, this.credentials?.Password, this.AuthTypes)); 1428fspContainer = new DirectoryEntry(fspWkDn, Credentials != null ? this.credentials.UserName : null, Credentials != null ? this.credentials.Password : null, this.authTypes); 1603if (ADUtils.VerifyOutboundTrust(this.DnsDomainName, this.credentials?.UserName, this.credentials?.Password)) 1605return new AuthZSet(sid, this.credentials, this.contextOptions, this.FlatDomainName, this, this.ctxBase); 1810defaultNCDirEntry = SDSUtils.BuildDirectoryEntry(path, this.credentials, this.authTypes); 2104int err = Utils.LookupSid(serverName, this.credentials, sid, out name, out domainName, out accountUsage); 2131PrincipalContext remoteCtx = SDSCache.Domain.GetContext(domainName, this.credentials, remoteOptions); 2222this.credentials, 2518this.credentials,