Attention: We have retired the IIS.NET Community Blogs. Learn more >

Contents tagged with process model

  • Under what context does my code run on IIS?

    Following up on my last two blogs, we continue to notice that folks have difficulty properly configuring IIS in a secure manner, because they tend to over-open the security of their system, giving privileges to both the "request identity" and the "process identity" that are above what are required for secure and reliable applications.