ACLs and Permissions


The ASP.NET process account and, for certain directories, any impersonation identities (if your applications use impersonation) require the following NTFS permissions. The permissions shown in Table 19.3 should be used in addition to any permissions your applications might require to access application-specific file system resources.

Process account:

Read and Execute

List Folder Contents

Read

Table 19.3: Required NTFS Permissions for ASP.NET Process Accounts

Directory

Required permissions

Temporary ASP.NET Files

 %windir%\Microsoft.NET\Framework\ {version}Temporary ASP.NET Files 

Process account and impersonated identities:

Full Control

Temporary Directory

 (%temp%) 

Process account:

Full Control

.NET Framework directory

 %windir%\Microsoft.NET\Framework\ {version} 

Process account and impersonated identities:

Read and Execute

List Folder Contents

Read

.NET Framework configuration directory

 %windir%\Microsoft.NET\Framework\ {version}\CONFIG 

Process account and impersonated Identities:

Read and Execute

List Folder Contents

Read

Web site root

 C:\inetpub\wwwroot 

or the path that the default Web site points to

Process account:

Read

System root directory

 %windir%\system32 

Process account:

Read

Global assembly cache

 %windir%\assembly 

Process account and impersonated identities:

Read

Content directory

 C:\inetpub\wwwroot\YourWebApp 
Note  

With .NET Framework version 1.0, all parent directories, back up to the file system root directory, also require the above permissions. Parent directories include:

C:\

C:\inetpub\

C:\inetpub\wwwroot\




Improving Web Application Security. Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures
ISBN: 0735618429
EAN: 2147483647
Year: 2003
Pages: 613

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net