I have a site that uses aspnet_setreg.exe to encrypt the username and password of the user using the identifier in the registry. It always worked fine, but when I run it on Windows 2008, I get the following:
C: \ aspnet_setreg> aspnet_setreg.exe -k: SOFTWARE \ MYCODE \ identity -u: "domain \ user" -p: "password"
Change the configuration to contain the following:
UserName = "registry: HKLM \ SOFTWARE \ MYCODE \ identity \ ASPNET_SETREG, username" password = "registry: HKLM \ SOFTWARE \ MYCODE \ identity \ ASPNET_SETREG, password"
The DACL in the registry key provides full access to the system, administrators, and the owner.
If you have encrypted credentials for the configuration section or the connection string for the configuration section, make sure that the process ID has read access to the registry key. Also, if you configured IIS to access content on
UNC, the account used to access the resource will need read access to the registry key. Regedt32.exe can be used to view / change registry key permissions.
You can rename the registry key and registry value to prevent detection.
Has anyone else used this and seen how it works in 2008.
thanks
source share