Questions tagged [impersonation]

29 questions
1
vote
1 answer

How to speed up applying impersonation rights changes?

I often add impersonation rights on various Windows Servers running Exchange Servers (2010, 2013) using PowerShell (New-ManagementRoleAssignment –Name:impersonationAssignmentName –Role:ApplicationImpersonation –User: ). The problem is…
1
vote
1 answer

Getting Impersonation working in Classic ASP app under IIS 7.5

What settings need to be in place in order to get impersonation working for a Classic ASP application running under IIS 7.5? I have it working perfectly on my test server (Windows Server 2008 R2), but I have a user who is trying to get it working…
1
vote
1 answer

Why must user be logged in for impersonation to work?

My Windows Server 2008 server hosts an ASP.net application that uses impersonation. The application works as long as the user being impersonated remains logged on to the server. However, when the user logs off, clients can no longer view the web…
Tarzan
  • 141
  • 2
  • 11
0
votes
1 answer

passing exe to non-admin user outside network to install software

I'm in a dead end now and need your help. I tried everything I could find on the web, but didn't succeed. I have hundreds of non-admin domain users working on their Windows 10 laptops outside our network with no VPN connection to the domain. I need…
rui
  • 25
  • 4
0
votes
0 answers

Configure Windows Service user account based on Domain Controller check

We have a patching service which is a windows service that patches the non domain controller and domain controllers. Currently we were using same service account(account_abc) which has a Domain Administrator privilege to patch all the servers We…
0
votes
0 answers

Is there a way to turn off impersonation for ISAPI extensions?

Is there a way to configure IIS7 to use worker process identity instead of authenticated user when running ISAPI extension?
username
  • 229
  • 1
  • 3
  • 17
0
votes
1 answer

IIS 6.0 on Windows Server 2003 setup for Integrated Windows Authentication but no direct access for users to the shared folders

I am attempting to set up an IIS 6.0 application running on Windows Server 2003 to use impersonation. Can anyone provide me with details of how this can be set up to work in conjunction with Windows Integrated Authentication? So far, I can tell that…
0
votes
1 answer

How do jabber servers find each other and how do they proof the authority for the domain they handle?

Recently google chatback has been turned off, and I was searching for an alternative that allows visitors of my website to isntantly message me, without the need of having a login at facebook or something similar. Furthermore I want to convinientley…
The Shurrican
  • 2,230
  • 7
  • 39
  • 58
0
votes
1 answer

Exchange impersonation rights

I need an answer to the following quetsion: What rights are required for Exchange Impersonation? I know this is kind of vague, but I really need an answer...
p0enkie
0
votes
1 answer

Allowing Service To Authenticate As User

On Windows XP through 7, I have a service that needs to be able to launch sub-processes as other users. Executing runas would do the trick, but SYSTEM is not configured to use runas without a password for the accounts. Can SYSTEM be configured to be…
Eric Pruitt
  • 403
  • 1
  • 4
  • 10
0
votes
1 answer

Impersonation on IIS 7.0 passes the machine credentials for Crystal Reports

On a 32-bit Windows 2008 server running the Donor2 Application in the Classic .NET Managed Pipeline mode, configured for Windows Integrated Authentication and Impersonation, all of the .NET pages are passing the authenticated user’s credentials…
pknox
0
votes
1 answer

Runas local Administrator, while authenticating as domain user

I am facing a peculiar setup, where I need to use local administrator on a windows machine. The instructions are as follows: Shift-right-click the cmd or Powershell shortcut Select "Run as Administrator" In the resulting UAC screen, authenticate as…
ddimitrov
  • 103
  • 3
-1
votes
0 answers

AD impersonating another user for shared program

We have a special server with a running program that needs to be shared locally between multiple users one at a time. A thought I had as this is doable in Linux, is to authenticate as their AD user, but map to a special user on this server upon…
-2
votes
2 answers

How to protect email addresses after domain name expires?

I'm thinking of creating a website for a friend. This includes registering a domain name and setting up a couple email addresses (myfriend@myfriend.com, etc.) If the friend doesn't maintain the domain registration, and the domain falls into the…
SeaDude
  • 107
  • 4
1
2