I have a boggle. IIS 5/Perl cgi script I have: - Created a virtual directory which points back to the IIS
server via UNC (this triggers the running process to allow network operations
off the server as a side effect) - NTFS Secured the directory to a select list of users - Enabled anonymous access on the directory and set it to be
an administrative user as the anonymous account (a calculated risk) This lets me perform administrative tasks against remote machines
from the cgi without doing impersonation which would
require me to store the password in some form in a local file. My question is this: When I issue a Win32::AdminMisc::GetLogonName,
or Win32::LoginName it reports the anonymous user. I would like to figure out if there is a
way to ferret out the username of the person running the script (ie, the one who was able to gain access via NTFS
permissions). If anyone has any
alternate suggestions for running privileged tasks which wouldn’t require
me storing a password and manually impersonating, I’m open to education. Sr. Technical Specialist, Server
Administration and Management Gentiva Health Services - 913-814-2369 - [EMAIL PROTECTED] |