- Change the ASP.NET worker process identity.
- Specify an impersonation identity.
- Specify a connection string for session state.
- <identity userName= password= />
- <processModel userName= password= />
- <sessionState stateConnectionString= sqlConnectionString= />
IntroductionUse the Aspnet_setreg.exe utility to encrypt and to store these attribute values in the registry under a secure key. Use the CryptProtectData function with the CRYPTPROTECT_LOCAL_MACHINE flag to encrypt the credentials. Because anyone with access to the computer can call CryptUnprotectData, the encrypted data is stored under a secure registry key with a strong discretionary access control list (DACL). When ASP.NET parses the configuration file, it reads the secure registry key and then uses CryptUnprotectData to decrypt the data.
Inetinfo.exe, which runs under the System identity, reads the <processModel /> section. To read the registry keys that store a user name and password for the ASP.NET worker process, the System account must have Read permission to these keys.
The ASP.NET worker process (Aspnet_wp.exe) reads the <identity /> and <sessionState /> sections. To read these registry keys, the worker process account must have Read permission to these keys. If content is hosted on a Universal Naming Convention (UNC) share, the account that is used to access the UNC share must have permission to read these keys.
By default, the registry keys that Aspnet_setreg.exe creates grant full control to the System, Administrator, and Creator Owner accounts. You can use Regedt32.exe to modify the DACL on the registry key. Make sure that arbitrary users cannot read the registry keys.
Restart IISFor your changes to take effect, you must restart Microsoft Internet Information Services (IIS). By restarting IIS, you start a new ASP.NET worker process. To do this, click Start, click
Run, type iisreset in the
Open box, and then click OK.
Note If the server that you have reconfigured is a domain controller, you may have to restart the server.
Download and run Aspnet_setreg.exeThe following file is available for download from the Microsoft Download Center:
Download the Aspnet_setreq.exe package now.
Release Date: April 11, 2003
For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:
To display all the available command-line switches and their usage, run this tool from the command prompt without any command-line switches. If you saved this tool to C:\Tools\, run the following command from the command prompt to display all of its available switches and help for the switches:
Use encrypted attributes in the configuration fileImportant This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
Note This tool creates the registry keys under the HKEY_LOCAL_MACHINE subtree. By default, only administrators can create keys under this subtree. Make sure that you are logged on as an administrator to successfully create these registry keys.
- Encrypt the userName and password attributes to be used with the <identity> section. (You can also do this for the other sections that are mentioned in this article). To do this, type the following command at the command line:c:\Tools>aspnet_setreg.exe -k:SOFTWARE\MY_SECURE_APP\identity -u:"yourdomainname\username" -p:"password"This command encrypts the userName and password attributes, creates registry keys at any location that you specify, and then stores the attributes in those registry keys. This command also generates output that specifies how to change your Web.config or Machine.config file so that ASP.NET will use these keys to read that information from the registry.
After you execute this command, you receive output that is similar to the following:
- Modify the corresponding configuration file to point to these registry keys. If these values must be used in the <identity> section, the resulting <identity> section resembles the following.
- Grant Read permissions to the Aspnet_wp.exe process account. For more information about how to change permissions for registry keys, see the "Use Regedt32.exe to grant permissions for the ASP.NET account on these registry keys" section.
Use Regedt32.exe to grant permissions for the ASP.NET account on these registry keysImportant This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
- Click Start, click Run, type regedt32 in the Open box, and then click OK.
- Click the HKEY_LOCAL_MACHINE\SOFTWARE\MY_SECURE_APP\subkey.
- On the Security menu, click
Permissions to open the Permissions dialog box.
On Microsoft Windows XP or on Windows Server 2003, right-click the registry key, and then click Permissions.
- Click Add. In the dialog box that opens, type yourservername\ASPNET(or
yourservername\NetWork Service when using Windows Server 2003 (IIS 6.0)), and then click OK.
- Make sure that the account that you just added has Read permissions, and then click OK.
- Close Registry Editor.
For more information about the Microsoft Windows registry, click the following article number to view the article in the Microsoft Knowledge Base:
Article ID: 329290 - Last Review: Oct 10, 2012 - Revision: 1