Forum Moderators: open
But before I get too into it, I need to make sure the security is such that a user cannot discover, or mess with other clients' data. Or the system data for that matter.
What's the best way to set up the user permissions for this?
[iis-aid.com...]
[learn.iis.net...]
[windowsecurity.com...]
Making sure you have proper ACL on each persons folders is a must so they can not see or access stuff they should not have access too.
What I'm unsure about in particular though, is the NTFS and Website User permissions.
Here's my folder structure:
C:
---> Web Root
------> Client
---------> Domain name (most clients have more than one)
I have already removed the 'Domain Users' group from the root of the drive, and assigned the client full access permissions on their own folder.
But the IUSR account can still access each client folder as IIS is using this for access. I'm worried that somebody could upload a PHP script, that, when executed by IIS could be used to interrogate another clients' site.
Do you think it's a good idea to make IIS user the clients' own account as it's anonymous access user, thus blocking IIS access outside the client folder?
I'm am writing a system which will upload a ZIP file, then PHP would extract it to the server.
It should also deny access to anything outside the client folder.
The only thing I'm not 100% sure about is securing Active Directory, I don't want someone to be able to discover users by browsing the directory.