Answer Posted / deepthi muktevi
At times users access a resource as though they were
someone else. This is known as impersonation. For example,
if a web page has no access controls, then any user can
access that web page. HTML pages, ASP pages, and components
in version 3.0 and earlier can be accessed through two
accounts named IUSR_machinename and IWAM_machinename. Both
the accounts are set up during IIS installation, and are
automatically added to all the folders in every web site on
the server.
Anonymous access to a resource in IIS makes the task of
identifying a user extremely difficult. But there is no
need to authenticate a user in the case of IIS. When IIS
receives a request for a web page or other resource that
has permission for anonymous access, IIS treats the
IUSR_machinename account as the user's account, to access
the resources. If the resource requested by the user is an
ASP page that uses a COM or COM+ component, that component
is executed using the IWAM_machinename account.
Is This Answer Correct ? | 13 Yes | 10 No |
Post New Answer View All Answers
Which versions of Merge are Year 2000 (Y2K) compliant?
What is the default vob size?
What is the "best" CM tool to use?
Plz Let me the Difference Between Bea Weblogic IBM Websphere
What Problem Management tools are available?
Hi can any one help me what are the prerequisites to billed before forecasting in SAP APO DP.............like blue sheet kindly help me the steps............
What's a 'bikeshed'?
How to make the folder comparison to show just added and deleted files?
How do Merge subscriptions work?
Can we use Merge to compare and synchronize local files with those on a web or FTP site?
Is there a version of Merge for Mac OS X?
What are the system requirements for Merge?
How would you use Version Control on an entire sub-system? And why would this be useful?
How many additional groups can be added in vob?
How many separate files do you have under QVCS control for managing the QVCS product itself?