Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is impersonation?

Answers were Sorted based on User's Feedback



What is impersonation?..

Answer / deepthi muktevi

At times users access a resource as though they were
someone else. This is known as impersonation. For example,
if a web page has no access controls, then any user can
access that web page. HTML pages, ASP pages, and components
in version 3.0 and earlier can be accessed through two
accounts named IUSR_machinename and IWAM_machinename. Both
the accounts are set up during IIS installation, and are
automatically added to all the folders in every web site on
the server.

Anonymous access to a resource in IIS makes the task of
identifying a user extremely difficult. But there is no
need to authenticate a user in the case of IIS. When IIS
receives a request for a web page or other resource that
has permission for anonymous access, IIS treats the
IUSR_machinename account as the user's account, to access
the resources. If the resource requested by the user is an
ASP page that uses a COM or COM+ component, that component
is executed using the IWAM_machinename account.

Is This Answer Correct ?    13 Yes 10 No

What is impersonation?..

Answer / technova

setting up Impersonation will help to know better to who
accessed or which user accessed the resource.This restrict
any anonymous access to the resource.

Is This Answer Correct ?    9 Yes 7 No

Post New Answer

More Version Control AllOther Interview Questions

What role do you see for the use of authentication processes such as digital signatures in helping to maintain version control?

0 Answers  


What are the benefits of SCM?

0 Answers  


What is the difference between configuration management tool and version control tool?

0 Answers  


What is the difference between the Standard and Professional Editions of Merge?

0 Answers  


Do you agree addressing the versioning issue is something GPO clearly needs to do, in conjunction with authentication and permanent public access ?

0 Answers  


Does Araxis offer floating (network) licences for Merge?

0 Answers  


What is "version control"?

0 Answers   CTS,


1)what is the difference b/w configuration management tool and version control tool? 2)Does TortoiseSVN a version control tool or configuration management tool?

2 Answers  


Can you uninstall an older version of Merge before installing a newer version or build?

0 Answers  


What's the best way to find out more about the capabilities of QVCS?

0 Answers  


you have done some changes to a program, how can you compare the existing program( in production) and the adapted ones?.

3 Answers   EDS,


How would you use Version Control on an entire sub-system? And why would this be useful?

0 Answers   Hetero,


Categories