Use this method to request access types for this user. You send in the name of the user in the aUser parameter, and the access types requested in the aAccessRequest parameter (bitmask). The system checks for only those access types specified in the aAccessRequest bitmask. The returned bitmask, aAccessAllowed, represents the user’s allowed access for the types you requested.
For anonymous access, the user ID is “anonymous”.
ICS_ACCESSTYPE constants (bitmaps) that define available access types are as follows:
Access Types |
Bitmaps |
---|---|
ICS_ACCESSTYPE_NONE |
0x00000000 |
ICS_ACCESSTYPE_READCOMPONENT |
0x00000001 |
ICS_ACCESSTYPE_WRITECOMPONENT |
0x00000002 |
ICS_ACCESSTYPE_CREATECOMPONENT |
0x00000008 |
ICS_ACCESSTYPE_DELETECOMPONENT |
0x00000010 |
ICS_ACCESSTYPE_READCALENDAR |
0x00000020 |
ICS_ACCESSTYPE_WRITECALENDAR |
0x00000040 |
ICS_ACCESSTYPE_CREATECALENDAR |
0x00000080 |
ICS_ACCESSTYPE_DELETECALENDAR |
0x00000100 |
ICS_ACCESSTYPE_SCHEDULE |
0x00000200 |
ICS_ACCESSTYPE_FREEBUSY |
0x00000400 |
ICS_ACCESSTYPE_SELF_ADMIN |
0x00000800 |
ICS_ACCESSTYPE_ALL |
0xFFFFFFFF |
Use this method to specify your own access control procedure. You can augment the native access control mechanism, performing your own processing first, then continuing with the default process, or you can completely replace the native access control mechanism.