Kerberos Protocol Transition and Constrained Delegation

6. Add the following lines to web.config in order to always impersonate the user when anyone comes to the site. Alternatives are to code impersonation within the application, but that is way beyond the scope of this article.

- <identity impersonate=”true” />
- <authentication mode=”Windows” />

7. Create an application pool and set the identity to the above account.

8. Install the application into its own website, or a virtual directory off another website.

9. Set the application pool for the virtual directory/website to the above application pool.

You should now find that when you go to the website and access the database, then the user that is logged on is the one who accessed the site rather than anonymous user or the application pool’s identity. This is now true regardless of what method of authentication you use on the web server (other than anonymous access only, of course).

Copyright 2004 by the author.

Pages: 1 2




Related Articles :

  • No Related Articles Found

No comments yet... Be the first to leave a reply!

Software Reviews | Book Reviews | FAQs | Tips | Articles | Performance Tuning | Audit | BI | Clustering | Developer | Reporting | DBA | ASP.NET Ado | Views tips | | Developer FAQs | Replication Tips | OS Tips | Misc Tips | Index Tuning Tips | Hints Tips | High Availability Tips | Hardware Tips | ETL Tips | Components Tips | Configuration Tips | App Dev Tips | OLAP Tips | Admin Tips | Software Reviews | Error | Clustering FAQs | Performance Tuning FAQs | DBA FAQs |