473,775 Members | 2,434 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Security question.

J-T
We have an asp.net application with <identity impersonate="tr ue"/> and
<authenticati on mode="Windows" /> in our web config and we are using Windows
integrated in IIS and also NT AUTHORITY\NETWO RK SERVICE account in its
application pool. I create an object in Global.asax which monitors a folder
for upcoming files.What is the security context of the object since there is
no user (Domain\Usernam e) requesting this object.Is it running under the
security context of AUTHORITY\NETWO RK SERVICE account ?

Thanks in advance
Nov 19 '05 #1
2 1203
objects don't have a security context, only threads do. if you access the
the object in global.asax before authentication, then you run under the app
pool account. if you call the object after the authentication event, then
you will run under the impersonated account

-- bruce (sqlwork.com)
"J-T" <JT@nospam.co m> wrote in message
news:ev******** ******@TK2MSFTN GP14.phx.gbl...
We have an asp.net application with <identity impersonate="tr ue"/> and
<authenticati on mode="Windows" /> in our web config and we are using
Windows integrated in IIS and also NT AUTHORITY\NETWO RK SERVICE account
in its application pool. I create an object in Global.asax which monitors
a folder for upcoming files.What is the security context of the object
since there is no user (Domain\Usernam e) requesting this object.Is it
running under the security context of AUTHORITY\NETWO RK SERVICE account ?

Thanks in advance

Nov 19 '05 #2
J-T
In that object I'd like to gain access to the file system of a windows 200
which is not in our domain,so I was thinking to set up our application pool
to run under a local aacount and then duplicate that account in windows 2000
server and give it right NTFS permission sets then for our database access I
create a sql server acount with the same name and password and I use this
connection string in my web.config

<add key="Main.Conne ctionString"
value="Server=d b-d;Database=vcad ;Min Pool Size=5;Trusted_ Connection=True "/>
OR
<add key="Main.Conne ctionString" value="Data Source=db-d;Min
Pool Size=5;Initial Catalog=vcad;In tegrated Security=SSPI;"/>

and also this:

identity impersonate="tr ue" username="MyUse r" password="123"/>
<authenticati on mode="Windows" />
Note: MyUser is a local account to each server and is the one which my
application pool is setup under.

Thanks a lot

"Bruce Barker" <br************ ******@safeco.c om> wrote in message
news:O7******** ********@TK2MSF TNGP14.phx.gbl. ..
objects don't have a security context, only threads do. if you access the
the object in global.asax before authentication, then you run under the
app pool account. if you call the object after the authentication event,
then you will run under the impersonated account

-- bruce (sqlwork.com)
"J-T" <JT@nospam.co m> wrote in message
news:ev******** ******@TK2MSFTN GP14.phx.gbl...
We have an asp.net application with <identity impersonate="tr ue"/> and
<authenticati on mode="Windows" /> in our web config and we are using
Windows integrated in IIS and also NT AUTHORITY\NETWO RK SERVICE account
in its application pool. I create an object in Global.asax which monitors
a folder for upcoming files.What is the security context of the object
since there is no user (Domain\Usernam e) requesting this object.Is it
running under the security context of AUTHORITY\NETWO RK SERVICE account ?

Thanks in advance


Nov 19 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

116
7553
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data and some who couldn't but that it wasn't important right now. And I said, 'sure, we can do that later'. So now I've developed an app without any thought to security and am trying to apply it afterwards. Doh!, doh! and triple doh!
32
2822
by: Mike MacSween | last post by:
Further to 'Security - more complex than I thought' Has anybody ever seen any studies? Or anecdotal evidence? Done any studies themselves? Done any lab testing - you know - 10 users asked to get past Access (or other) security? It'd be interesting to know. And no, I don't have any prejudices. Yours, Mike MacSween
5
2186
by: Greg Strong | last post by:
Hello All, What are the best ways to implement security for Access databases (i.e. ..MDB files)? I ask the question from a general perspective. Why? Well I had written a prototype database which I split. So I thought that I'd implement security on it. The security worked great for both groups (i.e. Admins & Users), but after looking at the detail I took it a little further.
1
1920
by: Jeremy S. | last post by:
..NET's code Access Security enables administrators to restrict the types of things that a .NET application can do on a local computer. For example, a ..NET Windows Forms application can be prevented from writing to the Registry or writing a file to the local disk. My question: Is this feature unique to .NET? Or is it just as easy for enterprise network administrators to prevent COM applications from writing to the Registry and doing...
15
10513
by: himilecyclist | last post by:
My State government organization has written a PHP/MySQL application which has been in production for about 6 months and has been highly successful. We are now embarking on a similar database application, but one with much higher security concerns (birth data). Prior to beginning the project, we met with an oversight committee who strongly advised against PHP and suggested Java. Their concern was that PHP could not be trusted to...
0
1824
by: jobs | last post by:
Using the delivered login controls, I see there is something for passwordrecovery. But I can't seem to find how to set properties so it does not ask me for my security question. Is there any way to use the delivered controls to do what most sites do today, where if I lost my password, I simply enter my user name or email address and it mails it to. If my user name or email are not in the database, I get an error, otherwise a new password...
18
2029
by: Earl Anderson | last post by:
First, I feel somewhat embarrassed and apologetic that this post is lengthy, but in an effort to furnish sufficient information (as opposed to too little information) to you, I wanted to supply all of the relevant facts. Second, despite the fact that I think the obvious 'quick' answer to my question would be 'Yes', I am seeking your wisdom and recommendation to the question as to this particular set of circumstances. I have 20 Security...
4
3076
by: vincent90152900 | last post by:
How to remove Security Question and Security Answer from membership provider? Following is my codes. Please tell me how to remove Question and Answer from membership provider. Thank you for replying. CreateNewWizard.aspx <asp:CreateUserWizard ID="CreateUserWizard1" runat="server"> <WizardSteps> <asp:CreateUserWizardStep runat="server"> </asp:CreateUserWizardStep> ...
1
5559
by: =?Utf-8?B?aGVyYmVydA==?= | last post by:
Question 1: How do I turn off WCF security to get my apps out the door quickly? Question 2: Where can I find a step by step article/flowchart how to configure WCF security (the WCF books miss this point)? Background: I have a WCF client / WCF host pair running fine on the same machine. Metadata is offered both via basicHttp and netTcp. Services are offered via netTcp. When distributing the WCF client on the intranet, everybody (my...
2
7667
by: Ken Fine | last post by:
I want to add the security question and answer security feature to the ChangePassword control. I am aware that this functionality is built into the PasswordRecovery tool. I have implemented the PasswordRecovery with a Password reset required; a temporary password is sent to the account on file. I want an extra layer of security to accommodate the very unlikely contingency that someone's e-mail account is compromised. Challenging with the...
0
9621
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10106
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10046
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9915
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
7463
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5484
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4014
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3611
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2852
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.