configuration - User rights needed for IIS 7.5 application pool user (domain user, not the AppPoolIdentity) -
we have active directory domain (let's call foodomain
) , domain user account (foodomain\fooapppooluser
) used iis application pool identity.
we want run app pool under user account , not under network service
or new apppoolidentity
have access sql server , have multiple applications on iis (with own app pools) accessing different databases.
the problem can't find clear how-to explaining, user rights have set user account , how iis has setup work.
first got errors (unfortunately can't remember ones), added fooapppooluser
local admin group (administrators
, know, test), worked. removed user again, restarted iis , still works.
so i'm confused bit , know, how configuration/setup has to have working.
somwhere read, account needs have "impersonate client after authentication" user right. that's reason added account admin group (the user rights assignment blocked via group policy, can sure changed if needed.
i hope clear enough question , hope has answer.
it's frustrating information hard find, since security admins seem enjoy cruel , unusual punishment of changing default policy settings thwart installing apps within iis.
here's believe should enable account work applicationpool identity:
- run
aspnet_regiis -ga domain\user
add permissions access iis metabase. (exactly means, knows?) aspnet_regiis reference - add user
iis_iusrs
group. may done automatically depending on iis configuration setting processmodel.manualgroupmembership easiest add yourself. - if security policy using windows defaults that's it. if security policy locked down may need enable specific user rights account. ones have default applicationpoolidentities (which seems place start not required):
- access computer network
- adjust memory quotas process
- allow log on locally
- bypass traverse checking
- generate security audit details
- impersonate client after authentication - (often not available default on locked-down environments)
- log on batch job - (often not available default on locked-down environments)
- log on service - (i'm not sure needed)
- replace process level token
- if you're using windows auth , kerberos (provider=
negotiate
) depending on url , if kernel-mode auth on might need set spn. suggest switching ntlm if possible. otherwise, see articles below spns , find friendly domain admin add them you.
fun reading:
- default permissions , user rights iis 7.0, 7.5, 8.0. best reference, see user rights @ bottom.
- user rights (on windows server 2008, still interesting , helpful it's long article can ctrl+f find iis-related comments)
- user rights assignment on server 2008 r2+. have drill each right see mentions iis.
- how to: create service account asp.net 2.0 application - pity there's no more recent version of article.
- spn checklist kerberos on iis7/7.5
- how use spns - applies iis6 or 7/8 if kernel-mode authentication turned off.
Comments
Post a Comment