SlideShare une entreprise Scribd logo
1  sur  10
IIS 6.0 General System Admin Overview
Configured as a static content (html) web server by default. To provide dynamic content (asp, asp.net, php, etc.) it should be configured using Web Services Extensions (in the form of dll’s, exe’s, cgi’s, etc). Web applications are isolated from each other using Application Pools by default. Create application pool Host web application in a virtual directory. IIS 6.0 Characteristics
Websites files are located in  	C:netpubwwroot Server files and configuration (metabase –xml file) is located in C:indowsystem32netsrv Logs files are located in Web server error log C:indowsystem32ogfilesTTPErr Web sites logs in C:indowsystem32ogfileslt;web site folder> IIS 6.0 Characteristics
Contains worker process w3wp.exe for application Could have more than a single worker process (called web garden) Memory configured using Recycling tab CPU configured using Performance tab Status check configured using Health tab Security account configured using Identity tab Network Service account ( network access only) Local Service account (local access only) Local System (network and local access) Application Pools (for dynamic content)
Web sites can have multiple applications hosted. ASP pages,ASP.Net pages Scripts CGI These applications can be assigned to different application pools (preferred method) By default all dynamic content is assigned to the default application pool in the web site properties Home Directory/Application settings tab Application Pools (for dynamic content)
Shared web hosting using: IP addresses (used for sites that use ssl) Tcp port numbers Host headers (preferred method) To use ssl (for encrypted communications),  server certificate needs to be requested and installed (as well as the private key). Contains dns name for web site Valid date Issuance information Public encryption key Web sites
The only way to constrain File System Object in a shared environment is with NTFS File System ACLs.  The most secure way to do this is to: Create one Application Pool per website Create unique Windows user for each Application Pool. Assign this Windows user as both Custom Application Pool Identity and Anonymous user identity for the website. ACL files on file system to the Windows user for all files the website should have access to. 	Basically, you force each Website to run as a unique Windows user (both process and anonymous authenticated identities), which forces all FSO usage to also run as that Windows user. You then apply NTFS ACLs for the Windows user as appropriate. Web Site Security
To disable FSO: regsvr32 scrrun.dll /u To disable WSH: regsvr32 wshom.ocx /u Web Site Security
To archive an IIS 6.0 Web site, run the following command on (or "against") the IIS 6.0 site. msdeploy -verb:sync -source:metakey=lm/w3svc/SITEID -dest:archivedir=c:rchive,encryptPasword=PASSWORD > msdeployarchive.log  To restore the IIS 6.0 Web site from an archive, run the following command on (or "against") the IIS 6.0 site: msdeploy -verb:sync -source:archivedir=c:rchive,encryptPasword=PASSWORD  -dest:metakey=lm/w3svc/SITEID >msdeployarchive.log  Web Site – Disaster Recovery
Configured as a Web Service Extension, examples: Tomcat connector Policy based authentication and single sign on –  CA SiteMinder Proxy services

Contenu connexe

Tendances (11)

Apache Web Server Setup 1
Apache Web Server Setup 1Apache Web Server Setup 1
Apache Web Server Setup 1
 
Apache Web Server Setup 3
Apache Web Server Setup 3Apache Web Server Setup 3
Apache Web Server Setup 3
 
Apache Web Server Setup 4
Apache Web Server Setup 4Apache Web Server Setup 4
Apache Web Server Setup 4
 
Apache Web server Complete Guide
Apache Web server Complete GuideApache Web server Complete Guide
Apache Web server Complete Guide
 
Freeingwebhost
FreeingwebhostFreeingwebhost
Freeingwebhost
 
Centralized logging for (java) applications with the elastic stack made easy
Centralized logging for (java) applications with the elastic stack   made easyCentralized logging for (java) applications with the elastic stack   made easy
Centralized logging for (java) applications with the elastic stack made easy
 
Apache Ppt
Apache PptApache Ppt
Apache Ppt
 
Armsec 2017 | 2 bugs 1 safari
Armsec 2017 | 2 bugs 1 safariArmsec 2017 | 2 bugs 1 safari
Armsec 2017 | 2 bugs 1 safari
 
test pdf
test pdftest pdf
test pdf
 
OSGi summary
OSGi summaryOSGi summary
OSGi summary
 
PHP Includes
PHP IncludesPHP Includes
PHP Includes
 

En vedette

Web Server Administration
Web Server AdministrationWeb Server Administration
Web Server Administrationwebhostingguy
 
Project Management Base Camp
Project Management Base CampProject Management Base Camp
Project Management Base Campeph-hr
 
Effective store keeping and successful inventory control.2
Effective store keeping and successful inventory control.2Effective store keeping and successful inventory control.2
Effective store keeping and successful inventory control.2Tajudeen Wahabi
 
SharePoint 2013 Site Administration
SharePoint 2013 Site AdministrationSharePoint 2013 Site Administration
SharePoint 2013 Site AdministrationLearning SharePoint
 
Material store & receipts
Material store & receiptsMaterial store & receipts
Material store & receiptsAmar Chaugule
 
Site Engineering Portal
Site Engineering PortalSite Engineering Portal
Site Engineering Portaleresource erp
 
Construction Administration Seminar
Construction Administration Seminar Construction Administration Seminar
Construction Administration Seminar jenkinswilliamc
 
Guide for Construction Contract Administrators
Guide for Construction Contract AdministratorsGuide for Construction Contract Administrators
Guide for Construction Contract AdministratorsSarah Fox
 
Advanced material of construction..ppt24545452
Advanced material of construction..ppt24545452Advanced material of construction..ppt24545452
Advanced material of construction..ppt24545452SHUBHAM DABHADE
 
Production planning & control(ppc)
Production planning & control(ppc)Production planning & control(ppc)
Production planning & control(ppc)Abu Bashar
 
Innovative Building Materials
Innovative Building MaterialsInnovative Building Materials
Innovative Building MaterialsShiva Sparky
 

En vedette (16)

Web Server Administration
Web Server AdministrationWeb Server Administration
Web Server Administration
 
Project Management Base Camp
Project Management Base CampProject Management Base Camp
Project Management Base Camp
 
Effective store keeping and successful inventory control.2
Effective store keeping and successful inventory control.2Effective store keeping and successful inventory control.2
Effective store keeping and successful inventory control.2
 
SharePoint 2013 Site Administration
SharePoint 2013 Site AdministrationSharePoint 2013 Site Administration
SharePoint 2013 Site Administration
 
Material store & receipts
Material store & receiptsMaterial store & receipts
Material store & receipts
 
Site Engineering Portal
Site Engineering PortalSite Engineering Portal
Site Engineering Portal
 
Estimation
EstimationEstimation
Estimation
 
Stores
StoresStores
Stores
 
Construction Administration Seminar
Construction Administration Seminar Construction Administration Seminar
Construction Administration Seminar
 
Behavioral Safety Leadership in Oil & Gas construction
Behavioral Safety Leadership in Oil & Gas constructionBehavioral Safety Leadership in Oil & Gas construction
Behavioral Safety Leadership in Oil & Gas construction
 
Guide for Construction Contract Administrators
Guide for Construction Contract AdministratorsGuide for Construction Contract Administrators
Guide for Construction Contract Administrators
 
Advanced material of construction..ppt24545452
Advanced material of construction..ppt24545452Advanced material of construction..ppt24545452
Advanced material of construction..ppt24545452
 
Store Inventory
Store InventoryStore Inventory
Store Inventory
 
Production planning & control(ppc)
Production planning & control(ppc)Production planning & control(ppc)
Production planning & control(ppc)
 
Innovative Building Materials
Innovative Building MaterialsInnovative Building Materials
Innovative Building Materials
 
Store management
Store managementStore management
Store management
 

Similaire à IIS 6 - General System Administration Overview

Ch 04 asp.net application
Ch 04 asp.net application Ch 04 asp.net application
Ch 04 asp.net application Madhuri Kavade
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Windows Hosting Documentation
Windows Hosting DocumentationWindows Hosting Documentation
Windows Hosting Documentationwebhostingguy
 
IIS internet information service NSA.ppt
IIS internet information service NSA.pptIIS internet information service NSA.ppt
IIS internet information service NSA.pptImranAhmadAhmad
 
introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)Assay Khan
 
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...Joel Oleson
 
Iis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.comIis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.comphanleson
 
01 asp.net session01
01 asp.net session0101 asp.net session01
01 asp.net session01Vivek chan
 
Aspnet architecture
Aspnet architectureAspnet architecture
Aspnet architecturephantrithuc
 
SharePoint 2007 Presentation
SharePoint 2007 PresentationSharePoint 2007 Presentation
SharePoint 2007 PresentationAjay Jain
 
Lessons from the Field: Setting up SharePoint on Azure
Lessons from the Field: Setting up SharePoint on AzureLessons from the Field: Setting up SharePoint on Azure
Lessons from the Field: Setting up SharePoint on AzureZachary Millis
 
Introducing asp
Introducing aspIntroducing asp
Introducing aspaspnet123
 
Creating php cloud applications
Creating php cloud applicationsCreating php cloud applications
Creating php cloud applicationsCory Fowler
 

Similaire à IIS 6 - General System Administration Overview (20)

Ch 04 asp.net application
Ch 04 asp.net application Ch 04 asp.net application
Ch 04 asp.net application
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Road Show Asp Net
Road Show Asp NetRoad Show Asp Net
Road Show Asp Net
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Windows Hosting Documentation
Windows Hosting DocumentationWindows Hosting Documentation
Windows Hosting Documentation
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
 
IIS internet information service NSA.ppt
IIS internet information service NSA.pptIIS internet information service NSA.ppt
IIS internet information service NSA.ppt
 
introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)
 
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
 
Hack ASP.NET website
Hack ASP.NET websiteHack ASP.NET website
Hack ASP.NET website
 
TO Hack an ASP .NET website?
TO Hack an ASP .NET website?  TO Hack an ASP .NET website?
TO Hack an ASP .NET website?
 
IIS 7: The Administrator’s Guide
IIS 7: The Administrator’s GuideIIS 7: The Administrator’s Guide
IIS 7: The Administrator’s Guide
 
Iis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.comIis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.com
 
01 asp.net session01
01 asp.net session0101 asp.net session01
01 asp.net session01
 
Aspnet architecture
Aspnet architectureAspnet architecture
Aspnet architecture
 
SharePoint 2007 Presentation
SharePoint 2007 PresentationSharePoint 2007 Presentation
SharePoint 2007 Presentation
 
Lessons from the Field: Setting up SharePoint on Azure
Lessons from the Field: Setting up SharePoint on AzureLessons from the Field: Setting up SharePoint on Azure
Lessons from the Field: Setting up SharePoint on Azure
 
Introducing asp
Introducing aspIntroducing asp
Introducing asp
 
Php Presentation
Php PresentationPhp Presentation
Php Presentation
 
Creating php cloud applications
Creating php cloud applicationsCreating php cloud applications
Creating php cloud applications
 

Plus de Information Technology (20)

Web303
Web303Web303
Web303
 
Sql Server Security Best Practices
Sql Server Security Best PracticesSql Server Security Best Practices
Sql Server Security Best Practices
 
SAN
SANSAN
SAN
 
SAN Review
SAN ReviewSAN Review
SAN Review
 
SQL 2005 Disk IO Performance
SQL 2005 Disk IO PerformanceSQL 2005 Disk IO Performance
SQL 2005 Disk IO Performance
 
RAID Review
RAID ReviewRAID Review
RAID Review
 
Review of SQL
Review of SQLReview of SQL
Review of SQL
 
Sql 2005 high availability
Sql 2005 high availabilitySql 2005 high availability
Sql 2005 high availability
 
MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2
 
MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1
 
Clustering and High Availability
Clustering and High Availability Clustering and High Availability
Clustering and High Availability
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007
 
SharePoint Topology
SharePoint Topology SharePoint Topology
SharePoint Topology
 
Sharepoint Deployments
Sharepoint DeploymentsSharepoint Deployments
Sharepoint Deployments
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Migration from ASP to ASP.NET
Migration from ASP to ASP.NETMigration from ASP to ASP.NET
Migration from ASP to ASP.NET
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 

Dernier

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

IIS 6 - General System Administration Overview

  • 1. IIS 6.0 General System Admin Overview
  • 2. Configured as a static content (html) web server by default. To provide dynamic content (asp, asp.net, php, etc.) it should be configured using Web Services Extensions (in the form of dll’s, exe’s, cgi’s, etc). Web applications are isolated from each other using Application Pools by default. Create application pool Host web application in a virtual directory. IIS 6.0 Characteristics
  • 3. Websites files are located in C:netpubwwroot Server files and configuration (metabase –xml file) is located in C:indowsystem32netsrv Logs files are located in Web server error log C:indowsystem32ogfilesTTPErr Web sites logs in C:indowsystem32ogfileslt;web site folder> IIS 6.0 Characteristics
  • 4. Contains worker process w3wp.exe for application Could have more than a single worker process (called web garden) Memory configured using Recycling tab CPU configured using Performance tab Status check configured using Health tab Security account configured using Identity tab Network Service account ( network access only) Local Service account (local access only) Local System (network and local access) Application Pools (for dynamic content)
  • 5. Web sites can have multiple applications hosted. ASP pages,ASP.Net pages Scripts CGI These applications can be assigned to different application pools (preferred method) By default all dynamic content is assigned to the default application pool in the web site properties Home Directory/Application settings tab Application Pools (for dynamic content)
  • 6. Shared web hosting using: IP addresses (used for sites that use ssl) Tcp port numbers Host headers (preferred method) To use ssl (for encrypted communications), server certificate needs to be requested and installed (as well as the private key). Contains dns name for web site Valid date Issuance information Public encryption key Web sites
  • 7. The only way to constrain File System Object in a shared environment is with NTFS File System ACLs. The most secure way to do this is to: Create one Application Pool per website Create unique Windows user for each Application Pool. Assign this Windows user as both Custom Application Pool Identity and Anonymous user identity for the website. ACL files on file system to the Windows user for all files the website should have access to. Basically, you force each Website to run as a unique Windows user (both process and anonymous authenticated identities), which forces all FSO usage to also run as that Windows user. You then apply NTFS ACLs for the Windows user as appropriate. Web Site Security
  • 8. To disable FSO: regsvr32 scrrun.dll /u To disable WSH: regsvr32 wshom.ocx /u Web Site Security
  • 9. To archive an IIS 6.0 Web site, run the following command on (or "against") the IIS 6.0 site. msdeploy -verb:sync -source:metakey=lm/w3svc/SITEID -dest:archivedir=c:rchive,encryptPasword=PASSWORD > msdeployarchive.log To restore the IIS 6.0 Web site from an archive, run the following command on (or "against") the IIS 6.0 site: msdeploy -verb:sync -source:archivedir=c:rchive,encryptPasword=PASSWORD -dest:metakey=lm/w3svc/SITEID >msdeployarchive.log Web Site – Disaster Recovery
  • 10. Configured as a Web Service Extension, examples: Tomcat connector Policy based authentication and single sign on – CA SiteMinder Proxy services