What is impersonation?
Answers were Sorted based on User's Feedback
Answer / deepthi muktevi
At times users access a resource as though they were
someone else. This is known as impersonation. For example,
if a web page has no access controls, then any user can
access that web page. HTML pages, ASP pages, and components
in version 3.0 and earlier can be accessed through two
accounts named IUSR_machinename and IWAM_machinename. Both
the accounts are set up during IIS installation, and are
automatically added to all the folders in every web site on
the server.
Anonymous access to a resource in IIS makes the task of
identifying a user extremely difficult. But there is no
need to authenticate a user in the case of IIS. When IIS
receives a request for a web page or other resource that
has permission for anonymous access, IIS treats the
IUSR_machinename account as the user's account, to access
the resources. If the resource requested by the user is an
ASP page that uses a COM or COM+ component, that component
is executed using the IWAM_machinename account.
| Is This Answer Correct ? | 13 Yes | 10 No |
Answer / technova
setting up Impersonation will help to know better to who
accessed or which user accessed the resource.This restrict
any anonymous access to the resource.
| Is This Answer Correct ? | 9 Yes | 7 No |
What is CVS(Control Version System?
How does Subversion handle binary files?
Which version control (VC) or software configuration management (SCM) systems work with Merge?
What is eSvn?
Which versions of Merge are Year 2000 (Y2K) compliant?
Is Version Control more for Software Development or Software Maintenance?
How does Problem Management relate to Configuration Management?
What is the recommended way to use three-way file merging?
How does the Hide Empty Folders command in the folder comparison window work?
What role do you see metadata playing in terms of reflecting versions, and the relationship between e- publications and other publications?
What is the default vob size?
you have done some changes to a program, how can you compare the existing program( in production) and the adapted ones?.