INFO: Difficulties Using Net APIs in ISAPI and ASP COM Objects (217144)



The information in this article applies to:

  • Microsoft Internet Information Server 3.0
  • Microsoft Internet Information Server 4.0
  • Microsoft Internet Information Services 5.0

This article was previously published under Q217144

SUMMARY

Network APIs (such as NetUserAdd) may fail with the error 86 when called from an ISAPI Extension DLL or COM object instantiated on an Active Server Pages (ASP) page.
The specified network password is not correct

MORE INFORMATION

W3SVC (Inetinfo.exe) runs under the Local System security context. ASP COM objects and ISAPI DLLs are loaded in the thread that impersonates either the IUSR_machinename user for anonymous requests, or the user whose credentials were submitted with the HTTP request. For OOP applications, the surrogate process, Mtx.exe (or DllHost.exe in IIS 5.0), runs under the IWAM_machinename. However, individual threads still impersonate the IUSR_machinename, or the user whose credentials were submitted with the HTTP request.

If a thread runs in the security context of the user (say, user JoeB) who has administrator or account operator permission in the domain, then it's possible to call Net API, such as NetUserAdd, from an ISAPI extension DLL or from a COM object created in an ASP page.

When network APIs are called the first time after Internet Information Server (IIS) is started, an authenticated named pipe is opened to the SAM database on the Primary Domain Controller in the security context of the authenticated user JoeB. You can see the pipe in the list of open files and pipes opened on the PDC by issuing the "net files" command. The pipe will be displayed as \PIPE\samr on the PDC machine.

For performance reasons the Windows NT operating system holds this named pipe open as long as the IIS process (Inetinfo.exe) is running. This poses a problem when subsequent requests submitted in the security context of a different user (say, JaneB) call the Network APIs again. The user JaneB cannot access a named pipe open for user JoeB. Therefore, NetUserAdd will fail as mentioned for the user JaneB.

Workarounds

The following are workarounds for this problem.
  • Use the workaround suggested in 155601 INFO: Understanding SAM Active Contexts Under Windows NT.
  • Create a custom IIS authentication filter (similar to AuthFilt from the IIS SDK. Such a filter can map requests from different users to the security context of a single user. Therefore the ISAPI or COM object will always be invoked in the security context of the same user.
  • In an ISAPI or COM object, use impersonation code similar to the code below so that calls always occur in the same security context. Be aware that the security context that the code is running in must have "Act as Part of the Operating System" privileges to successfully call LogonUser.

       // Get current security token 
       hToken1 = OpenThreadToken(GetCurrentThread(),
                                 TOKEN_READ | OKEN_IMPERSONATE,
                                 TRUE,...);
    
       hToken2 = LogonUser();   // Obtain security token
                                // for some user
       ImpersonateLoggedOnUser(hToken2, ...);
       NetUserAdd();  // At this point NetAPI is alway called
                      // in the same security context
       ImpersonateLoggedOnUser(hToken1, ...);
       CloseHandle (hToken1);
       CloseHandle (hToken2);
       ...
    						

REFERENCES

For more information, see the following articles in the Microsoft Knowledge Base:

155601 Understanding SAM Active Contexts Under Windows NT
158229 Security Ramifications for IIS Applications
207671 Accessing Network Files from IIS Applications

Win32 Platform SDK documentation


Modification Type:MajorLast Reviewed:3/1/2006
Keywords:kbfilters kbhttp kbinfo KB217144