11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

578 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>Table 19.3 Required NTFS Permissions for ASP.NET Process AccountsDirectoryRequired permissionsTemporary ASP.NET FilesProcess account <strong>and</strong> impersonated identities:%windir%\Microsoft.NET\Framework\{version}Temporary ASP.NET FilesTemporary Directory(%temp%).NET Framework directory%windir%\Microsoft.NET\Framework\{version}.NET Framework configuration directory%windir%\Microsoft.NET\Framework\{version}\CONFIG<strong>Web</strong> site rootC:\inetpub\wwwrootFull ControlProcess account:Full ControlProcess account <strong>and</strong> impersonated identities:Read <strong>and</strong> ExecuteList Folder ContentsReadProcess account <strong>and</strong> impersonated Identities:Read <strong>and</strong> ExecuteList Folder ContentsReadProcess account:Reador the path that the default <strong>Web</strong> site points toSystem root directory%windir%\system32Global assembly cache%windir%\assemblyContent directoryC:\inetpub\wwwroot\Your<strong>Web</strong>AppProcess account:ReadProcess account <strong>and</strong> impersonated identities:ReadProcess account:Read <strong>and</strong> ExecuteList Folder ContentsReadNote With .NET Framework version 1.0, allparent directories, back up to the file system rootdirectory, also require the above permissions.Parent directories include:C:\C:\inetpub\C:\inetpub\wwwroot\

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!