11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

558 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>Do Not Run ASP.NET as SYSTEMDo not use the SYSTEM account to run ASP.NET <strong>and</strong> do not grant the ASP.NETprocess account the “Act as part of the operating system” user right. Doing so defeatsthe principle of least privilege <strong>and</strong> increases the damage that can be done by anattacker who is able to execute code using the <strong>Web</strong> application’s process securitycontext.ImpersonationBy default, ASP.NET applications do not impersonate. The security context of theASP.NET worker process account (ASPNET by default) is used when yourapplication accesses Windows resources.The element is used to enable impersonation. You can impersonate:●●The original caller (the IIS authenticated identity)A fixed identityImpersonating the Original CallerTo impersonate the original caller, use the following configuration:The impersonation uses the access token provided by IIS that represents theauthenticated caller. This may be the anonymous Internet user account, for example,if your application uses Forms authentication, or it may be a Windows account thatrepresents the original caller, if your application uses Windows authentication.If you do enable original caller impersonation, note the following issues:● <strong>Application</strong> scalability is reduced because database connections cannot beeffectively pooled.● Administration effort increases as ACLs on back-end resources need to beconfigured for individual users.● Delegation requires Kerberos authentication <strong>and</strong> a suitably configuredWindows 2000 environment.For more information, see “How To: Implement Kerberos Delegation forWindows 2000” in the “How To” section of “Microsoft patterns & practices Volume I,Building Secure ASP.NET <strong>Application</strong>s: Authentication, Authorization, <strong>and</strong> SecureCommunication” at http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnnetsec/html/SecNetHT05.asp.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!