11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 20: Hosting Multiple <strong>Web</strong> <strong>Application</strong>s 595Anonymous Account ImpersonationWith anonymous account impersonation, your application impersonates theanonymous account specified by IIS <strong>and</strong> configured for your application’s virtualdirectory. You can use this approach if your application authenticates usersindependently of IIS, for example, by using Forms or Microsoft Passportauthentication. In these scenarios, you can isolate the application by using a fixedanonymous account. Once the caller is authenticated <strong>and</strong> roles are checked, thetrusted server model can be used for downstream resource access, where theconfigured anonymous account provides the trusted identity.To support this approach, the application’s virtual directories in IIS must supportanonymous access <strong>and</strong> a separate anonymous account must be configured for eachapplication. The application must then be configured for impersonation. Thisapproach is shown in Figure 20.3. Local <strong>and</strong> remote resource access assumes thesecurity context of the impersonated anonymous account.<strong>Web</strong> ServerIIS(inetinfo.exe)ASP. NET(aspnet_wp.exe)RemoteComputer(s)v-dir1IUSR_1AppDomain1IUSR_1RemoteResourcev-dir2IUSR_2AppDomain2IUSR_2RemoteResourcev-dir3IUSR_3AppDomain3IUSR_3RemoteResourceAnonymousAuthenticationImpersonationFigure 20.3Multiple anonymous accounts used for each application

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!