11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 20: Hosting Multiple <strong>Web</strong> <strong>Application</strong>s 597Note The type of logon session created is controlled by the LogonMethod IIS Metabasesetting. The default is an interactive logon session, which requires the account to have the“Allow Log on Locally” user privilege.The Allow IIS to Control Password option is not available on IIS 6. IIS 6 sets the defaultLogonMethod to Network Cleartext, which requires the account to have the “Access thiscomputer from the network” user privilege. This allows the account to be authenticated by anetwork server.4. Configure NTFS permissions for each account to ensure that each account hasaccess only to the appropriate file system files <strong>and</strong> folders, <strong>and</strong> cannot accesscritical resources such as operating system tools.For more information about configuring NTFS permissions for the anonymousaccount, see Chapter 16, “Securing Your <strong>Web</strong> Server.”Note If you run the IISLockdown wizard, it creates a <strong>Web</strong> Anonymous Users group. Members ofthis group are denied access to system directories <strong>and</strong> tools.Fixed Identity ImpersonationWhen you need IIS to authenticate users for your application, for example by usingIntegrated Windows authentication or certificate authentication, you can use a fixedimpersonation identity to execute your ASP.NET application. This scenario is shownin Figure 20.4.ABCDEF<strong>Web</strong> ServerIIS(inetinfo.exe)v-dir1v-dir2v-dir3ABCDEFASP. NET(aspnet_wp.exe)AppDomain1AppDomain2AppDomain3App1UserApp2UserApp3UserRemoteComputer(s)RemoteResourceRemoteResourceRemoteResourceIntegrated WindowsAuthenticationFixed AccountImpersonationFigure 20.4<strong>Application</strong>s impersonate a fixed account <strong>and</strong> use that to access resources

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!