Dear all,
I found a very interesting thing about viewing crystal report (located
on network drive) with asp.net application.
To do the impersonation, modify web.config does not work, you have to
modify machine.config. which is not recommended. However, there is no
way around. To prove I did the impersonation properly, I did the below
test.
1. Create a txt file on same network drive
2. try to write to the txt file without using any impersonation, it
failed
3. modify web.config to do impersonation, then the application could
write to the txt file, but still failed to load crystal report.
4. modify machine.config to do impersonation, then the application
could write to the txt file, and load the crystal report.
Both impersonation are in the context of my windows account.
I use vs.2003
In theory, modify machine.config and web.config should achieve the same
effect for my web application, but impersonate machine.config, normally
is not accepted, since all the web application running on the same web
server will be impersonated.
Anyone could give me answer?
Regards,
zhuang 1 1527
Since no one replies, I just tell you what I have found so far(still
need to be tested, wait for system admin at the moment)
Using impersonation to access resources on network drive also depends
on server's configuration, it could accept your request as being
impersonated or just using that machine's own account. That's probably
why changing maching.config works. However, modify machine.config is
not suggested anyway, so you may ask system admin to config the
server(where the resources stored) to accept delegation, so changing
web.config will work.
However, this will possibly leave another security hole to the server,
malicious program will using impersonation to attack the server. This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Bruno R. Dias |
last post by:
Perhaps it would be interesting to program a virtual machine simulating
an ancient computer (such as the pdp-7). Then, it would be rather
interesting to code for it (porting gcc to it maybe?). I think it would
be fun to play with the long-forgotten art of coding in machine language.
And what about a fictional computer, such as one that works...
|
by: rawrite |
last post by:
I am just finishing watching a documentary about Rod Serling.
It was cool, but after 20 minutes it got boring and all I wanted to do
is subscribe to Net Flix and rent the Twilight Zone episodes.
Some times the work is more interesting than the life.
|
by: Johnny Lee |
last post by:
Hi,
Look at the follow command in python command line, See what's
interesting?:)
>>> class A:
i = 0
>>> a = A()
>>> b = A()
>>> a.i = 1
>>> print a.i, b.i
|
by: Dylan Phillips |
last post by:
A strang error is occurring when I run the following code:
SqlConnection c = new SqlConnection();
c.ConnectionString = "Initial Catalog=Northwind;user
id=sa;password=kat1ie;Data Source=server";
c.Open();
SqlCommand command = c.CreateCommand();
command.CommandType = CommandType.Text;
command.CommandText = "select Customers.customerid,...
|
by: eBob.com |
last post by:
Is there a namespace of interesting and important constants such as
maximum length of a filename, maximum length of a path, maximum and
minimum values which can be held by a Long (and other data types of
course), etc., etc.?
In C there is a header file (I forget its name at the moment) with
things like MAX_PATH. Most useful.
I know...
| |
by: Mythran |
last post by:
Here is some code the provides some really interesting results! First, read
over the two methods in class 'A' and compare. Just by looking at them,
both results appear to return the EXACT same information the same way. But
the appearances are deceiving! Copy and paste into a console application,
then set the configuration to Release mode...
|
by: v4vijayakumar |
last post by:
#include <string>
#include <iostream>
using namespace std;
int main()
{
string str;
str.resize(5);
str = 't';
|
by: jacob navia |
last post by:
Buffer overflows are a fact of life, and, more specifically, a fact of
C.
All is not lost however. In the book
"Value Range Analysis of C programs" Axel Simon tries to establish a
theoretical framework for analyzing C programs. In contrast to other
books where the actual technical difficulties are "abstracted away",
this books tries to...
|
by: timer |
last post by:
In the years past, there used to very interesting discussions in c.l.c
But now, topics are not as interesting anymore.
What happened?
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
| |
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...
| |