I have a boggle.

 

IIS 5/Perl cgi script

 

I have:

- Created a virtual directory which points back to the IIS server via UNC (this triggers the running process to allow network operations off the server as a side effect)

- NTFS Secured the directory to a select list of users

- Enabled anonymous access on the directory and set it to be an administrative user as the anonymous account (a calculated risk)

 

This lets me perform administrative tasks against remote machines from the cgi without doing impersonation which would require me to store the password in some form in a local file.  My question is this:

 

When I issue a Win32::AdminMisc::GetLogonName, or Win32::LoginName it reports the anonymous user.  I would like to figure out if there is a way to ferret out the username of the person running the script (ie, the one who was able to gain access via NTFS permissions).  If anyone has any alternate suggestions for running privileged tasks which wouldn’t require me storing a password and manually impersonating, I’m open to education.

 

 

Kevin Gould

Sr. Technical Specialist, Server Administration and Management

Gentiva Health Services - Overland Park, KS

913-814-2369 - [EMAIL PROTECTED]

 

 

 

Reply via email to