Solved

Configure IIS6 to allow anonymous login

Posted on 2011-03-03
7
616 Views
Last Modified: 2012-05-11
I want to allow anonymous login to my site but everytime I visit the page it prompts me for a user/password.

I have configured anonymous login properties of site and set user to IUSR_<machineName>. Any ideas what I've missed?
0
Comment
Question by:Lico_w
  • 4
  • 3
7 Comments
 
LVL 13

Accepted Solution

by:
AustinComputerLabs earned 500 total points
ID: 35027840
Have you set the permissions on the folder that contains the website and the files whithin it to allow read access to IUSR_machine name?
0
 

Author Comment

by:Lico_w
ID: 35028096
Thats not the answer as this user is created by IIS. Besides I've allowed full access to everyone for this share
0
 
LVL 13

Expert Comment

by:AustinComputerLabs
ID: 35028246
If you created a folder for this website, you will need to give the IIS_IUSRS user list and read permissions under secirity not under sharing.
the user is created by IIS but that user is only given rights to the default website directory by default.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 

Author Comment

by:Lico_w
ID: 35028277
I have allowed everyone full access under there also
0
 
LVL 13

Expert Comment

by:AustinComputerLabs
ID: 35028888
Under the properties for the site in IIS did you check allow anonymous access?
0
 

Author Comment

by:Lico_w
ID: 35028943
Yes and I included the IUSR as my anonymous login account, although I didn't set a password for this as I don't know what it would be..?
0
 

Author Closing Comment

by:Lico_w
ID: 35058344
Turns out some permissions hadn't been inherited from parent folder ;)
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

On July 14th 2015, Windows Server 2003 will become End of Support, leaving hundreds of thousands of servers around the world that still run this 12 year old operating system vulnerable and potentially out of compliance in many organisations around t…
Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now