configuration - User rights needed for IIS 7.5 application pool user (domain user, not the AppPoolIdentity) -


we have active directory domain (let's call foodomain) , domain user account (foodomain\fooapppooluser) used iis application pool identity.

we want run app pool under user account , not under network service or new apppoolidentity have access sql server , have multiple applications on iis (with own app pools) accessing different databases.

the problem can't find clear how-to explaining, user rights have set user account , how iis has setup work.

first got errors (unfortunately can't remember ones), added fooapppooluser local admin group (administrators, know, test), worked. removed user again, restarted iis , still works.

so i'm confused bit , know, how configuration/setup has to have working.

somwhere read, account needs have "impersonate client after authentication" user right. that's reason added account admin group (the user rights assignment blocked via group policy, can sure changed if needed.

i hope clear enough question , hope has answer.

it's frustrating information hard find, since security admins seem enjoy cruel , unusual punishment of changing default policy settings thwart installing apps within iis.

here's believe should enable account work applicationpool identity:

  • run aspnet_regiis -ga domain\user add permissions access iis metabase. (exactly means, knows?) aspnet_regiis reference
  • add user iis_iusrs group. may done automatically depending on iis configuration setting processmodel.manualgroupmembership easiest add yourself.
  • if security policy using windows defaults that's it. if security policy locked down may need enable specific user rights account. ones have default applicationpoolidentities (which seems place start not required):
    • access computer network
    • adjust memory quotas process
    • allow log on locally
    • bypass traverse checking
    • generate security audit details
    • impersonate client after authentication - (often not available default on locked-down environments)
    • log on batch job - (often not available default on locked-down environments)
    • log on service - (i'm not sure needed)
    • replace process level token
  • if you're using windows auth , kerberos (provider=negotiate) depending on url , if kernel-mode auth on might need set spn. suggest switching ntlm if possible. otherwise, see articles below spns , find friendly domain admin add them you.

fun reading:


Comments

Popular posts from this blog

c# - SharpSVN - How to get the previous revision? -

c++ - Is it possible to compile a VST on linux? -

url - Querystring manipulation of email Address in PHP -