Last post Jul 21, 2012 02:20 AM by AlexFeldman
May 18, 2011 05:22 PM|zebra1024|LINK
I have an HTTPModule which authenticates a user against AD based on a cookie token and sets the HttpContext.User property to a WindowsIdentity created from a token generated by the logonuser WIN32 function.
This allows me to simulate Windows authentication through a forms based credentials process. This is used on a ASP.Net app and a SharePoint site.
The issue I have is this code executes fine if the pool account is in the local admin group. Otherwise it throws the following exception.
SecurityModule.FBAToNTIntegratedModule [(null)] - Authentication Request
System.UnauthorizedAccessException: Attempted to perform an unauthorized operation.
at System.Web.Hosting.IIS7WorkerRequest.SetPrincipal(IPrincipal user, IntPtr pManagedPrincipal)
at System.Web.HttpContext.SetPrincipalNoDemand(IPrincipal principal, Boolean needToSetNativePrincipal)
at System.Web.HttpContext.set_User(IPrincipal value)
at SecurityModule.FBAToNTIntegratedModule.context_AuthenticateRequest(Object sender, EventArgs e) in
I do not want to add the pool account to the admin group but I can give it additional privileges to make this work. Is it possible to configure this account so this process will work? What privileges does the account need?
May 23, 2011 04:01 PM|zebra1024|LINK
I have not found a way to fix this issue but I did want to reply with a workaround that I can live with.
I wrapped the code that sets the User on the Context object in a Impersonation block which impersonates a local user that is in the local Administrator group. This allows the code to execute properly without requiring the pool account to be a local administrator.
My code is below. In my real code I pull the credentials from encrypted values in a config file.
private void SetContextUser(HttpContext ctx, IPrincipal user)
bool impersonate = false;
WindowsImpersonationContext impContext = null;
WindowsIdentity user = null;
if (impCreds != null)
//Impersonate use to set user in context
impersonate = true;
IntPtr token = LogonUser("Username", "Domain", "Password");
//Get Identity from Token
if (token != IntPtr.Zero)
//Create the Identity
user = new WindowsIdentity(token);
impContext = adminUser.Impersonate();
//Set user while impersonating user with admin rights
ctx.User = user;
//Go back to original identity
catch (Exception e)
Nov 15, 2011 12:11 PM|EagleWizard|LINK
I am having the same issue, but for me it doesn't help if I add the application pool user to the Administrators of the server.
Have you found an other way to fix this issue? Any suggestions on fixing this?
I really need a solution for this, but I not manage to find a user that has sufficient rights the perform this operation
Jul 21, 2012 12:29 AM|AlexFeldman|LINK
I am also having this issue. Described the
question on stackoverflow. I was able to get it working by changing the application pool's identity to LocalSystem but I can't leave that as a solution. Using local Administrators group doesn't help, so the temporary elevated permissions with an a user
that has admin rights doesn't work. Any help is appreciated.
Jul 21, 2012 02:20 AM|AlexFeldman|LINK
I figured out the answer! You have to specify the AuthenticationType when constructing the WindowsIdentity object. I document the solution here: http://stackoverflow.com/a/11588736/265877.