Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is impersonation?

Answer Posted / deepthi muktevi

At times users access a resource as though they were
someone else. This is known as impersonation. For example,
if a web page has no access controls, then any user can
access that web page. HTML pages, ASP pages, and components
in version 3.0 and earlier can be accessed through two
accounts named IUSR_machinename and IWAM_machinename. Both
the accounts are set up during IIS installation, and are
automatically added to all the folders in every web site on
the server.

Anonymous access to a resource in IIS makes the task of
identifying a user extremely difficult. But there is no
need to authenticate a user in the case of IIS. When IIS
receives a request for a web page or other resource that
has permission for anonymous access, IIS treats the
IUSR_machinename account as the user's account, to access
the resources. If the resource requested by the user is an
ASP page that uses a COM or COM+ component, that component
is executed using the IWAM_machinename account.

Is This Answer Correct ?    13 Yes 10 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Is there a version of Merge for Linux?

2177


When vob is created at first time?

880


How to manage several different projects under Subversion?

1928


Does QVCS integrate with any IDE?

2096


What is the default vob size?

908


How many separate files do you have under QVCS control for managing the QVCS product itself?

1964


What tools are used to develop QVCS?

2067


What is the recommended way to use three-way file merging?

2054


Do you agree addressing the versioning issue is something GPO clearly needs to do, in conjunction with authentication and permanent public access ?

2407


What is the "best" CM tool to use?

2178


How does Subversion handle binary files?

2225


Which versions of Merge are Year 2000 (Y2K) compliant?

1861


What's a 'bikeshed'?

1878


What is impersonation?

10256


How to make the folder comparison to show just added and deleted files?

2170