Solved

Trying to Fully Understand Setting IIS Permissions ...

Posted on 2006-07-05
4
223 Views
Last Modified: 2013-12-04
I have had a couple people tell me different on setting permissions in IIS.  Once a person is "added" on the security tab, I click the "advanced" tab.  There are two check boxes at the bottom of the window:

1.  "Replace permission entries on all child objects with entries shown here that apply to child objects."
2.  "Inherit from the parent the permission entries that apply to child."

What do these mean exactly, and what are the advantages/disadvantages of checking these boxes and clicking apply?  I am afraid to check either for fear of erasing permissions on subfolders.  Any plain English response will be appreciated!

Thanks!  :o)
0
Comment
Question by:ODATech
  • 2
  • 2
4 Comments
 
LVL 26

Accepted Solution

by:
DireOrbAnt earned 300 total points
ID: 17045801
1 means that you will carry those permission changes to all child object (subfolders and files in them).
2 means that you want to Inherit the permissions that are set on the parent folder and apply them here. If you check this, your changes won't make any difference because they will revert to what the parent folder has.

Structure:
c:\Parent\IISFolder\Child1
0
 

Author Comment

by:ODATech
ID: 17045818
Thanks DireOrbAnt!  So if I check #1, will it erase all the other permissions set on the subfolders?
0
 
LVL 26

Expert Comment

by:DireOrbAnt
ID: 17045900
Yes, it will reset them all to match what you just put in (plus what was there already).
So, if Administrator Full was there and you added Bob Read Only, then checking this will make this folder+files and all child folder+files have Administrator Full and Bob Read, nothing else.
0
 

Author Comment

by:ODATech
ID: 17045915
Great!  I think that's what I want to do then.  I am bumping the points up 50 on this since the response was so quick!  This is a fabulous site for those of us who are not yet experts!  :o)
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question