Double Hop Impersonation, Protocol Transitioning and Constrained Delegation in ASP.NET 4

时光怂恿深爱的人放手 提交于 2019-12-03 21:39:25

Constrained Delegation is the only way to flow impersonated credentials information to a second host. ASP.Net has nothing to do with it, is just an ordinary app that uses the Kerberos framework. Nothing changed. Once the ASP.NEt applicaiton impersonates the context authenticated by IIS (see Configure ASP.NET Impersonation Authentication) the same rules for delegation apply:

  • The app pool account must be configured to be trusted for constrained delegation
  • The SQL Server must have the SPN properly registered
易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!