473,396 Members | 1,775 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Deploying ASP.NET in a mixed NT4 & W2K domain

Hi all,

I am developing an ASP.NET app that will be deployed
into a mixed NT4 & W2K domain. The PDC is running NT4
(I know we should have upgraded by now and it is on the
cards but this is what I have to work with).

On my development machine I have an ASPNET user
that I assume is my annonymous user, but this user
is not present in the domain! Do I need an ASPNET user
in the domain?

Can I use the authentication of the user instead on an
annonymous user as this is an Intranet app to detetmine
which server and network resources are available? How
do I do this?

Does anyone have any useful resources that I should check
out that will answer my questions and give me some
guidance on deploying to a mixed OS domain? The
server running IIS is W2K right now.

Many thanks,

Jason.
Nov 19 '05 #1
4 1069
On Wed, 27 Jul 2005 08:08:33 GMT, ja***@dive-master.org (Jason James) wrote:

¤ Hi all,
¤
¤ I am developing an ASP.NET app that will be deployed
¤ into a mixed NT4 & W2K domain. The PDC is running NT4
¤ (I know we should have upgraded by now and it is on the
¤ cards but this is what I have to work with).
¤
¤ On my development machine I have an ASPNET user
¤ that I assume is my annonymous user, but this user
¤ is not present in the domain! Do I need an ASPNET user
¤ in the domain?
¤

No, it's a local restricted account and the default account under which the thread of your ASP.NET
application executes when not implementing impersonation (the default). This account is not the same
as the Anonymous accounts IUSR_<machinename> and IWAM_<machinename>.
¤ Can I use the authentication of the user instead on an
¤ annonymous user as this is an Intranet app to detetmine
¤ which server and network resources are available? How
¤ do I do this?
¤

Yes, you can enable impersonation for access to local (web server) resources when using
authenticated (Basic, Digest, Integrated NT) security:

http://msdn.microsoft.com/library/de...ersonation.asp

If you need to delegate security to access remote resources then see the following:

http://msdn.microsoft.com/library/de...delegation.asp
Paul
~~~~
Microsoft MVP (Visual Basic)
Nov 19 '05 #2
Paul,

thanks for the info. I'll take a look at the links right now.
No, it's a local restricted account and the default account under which the thread of your ASP.NET
application executes when not implementing impersonation (the default). This account is not the same
as the Anonymous accounts IUSR_<machinename> and IWAM_<machinename>.


Can you please provide me with an explanation of the differences
between the two user accounts you name above, and what each
is used for, when it is used and by what process?

Many thanks,

Jason.
Nov 19 '05 #3
On Thu, 28 Jul 2005 05:46:22 +0100, Jason L James <ja***@nospam.divemaster.org> wrote:

¤ Paul,
¤
¤ thanks for the info. I'll take a look at the links right now.
¤
¤ >No, it's a local restricted account and the default account under which the thread of your ASP.NET
¤ >application executes when not implementing impersonation (the default). This account is not the same
¤ >as the Anonymous accounts IUSR_<machinename> and IWAM_<machinename>.
¤
¤ Can you please provide me with an explanation of the differences
¤ between the two user accounts you name above, and what each
¤ is used for, when it is used and by what process?

The IUSR_<machinename> account is the default identity used for IIS (low protection) in-process web
applications, while the IWAM_<machinename> account is the identity used for IIS (medium or higher)
out-of-process pooled web applications (running under their own DLLHost process).
Paul
~~~~
Microsoft MVP (Visual Basic)
Nov 19 '05 #4
Paul,

many thanks,

Jason.
Nov 19 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Adam Stewart | last post by:
Hi All, We have started to get the strangest errors with our SQL Server. We use Windows and SQL Server authentication, and have done successfully for the last year or so. However last week i had...
8
by: Ted Miller | last post by:
Hi folks, I'm looking at moving a large base of C++ code to .Net under tight time constraints. The code runs in mission-critical environments, and I am extremely concerned about the loader lock...
8
by: Bern McCarty | last post by:
Is it at all possible to leverage mixed-mode assemblies from AppDomains other than the default AppDomain? Is there any means at all of doing this? Mixed-mode is incredibly convenient, but if I...
14
by: Arne | last post by:
A lot of Firefox users I know, says they have problems with validation where the ampersand sign has to be written as &amp; to be valid. I don't have Firefox my self and don't wont to install it only...
0
by: Stephen E. Weber | last post by:
I have an exchange server 5.5 on a NT Box, I upgraded the domain to AD, Mixed mode, there are a few NT Boxes, so I cant move over to native mode right now, I am working on a swing migration to...
1
by: Bern McCarty | last post by:
I know how with VC8 you embed your linker generated manifest into an exe with a resource ID of #1 and into a dll with resource ID #2. But what do you do with the linker generated manifest for a...
4
by: Preben Zacho | last post by:
Hi there The scenario I got is this: I have created a Windows application in VS and I want to deploy it to another machine running Windows Vista. Since I have no control over this other machine,...
3
by: kkao77 | last post by:
can you show me in more detail? I have same problem where on the page it's https://service.premilance.com/Company.svc, but the svcutil tells me to get it from https://pserver1/Company.svc?wsdl...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.