Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

MS IIS6 - my Web Service Extension is in "allow" and NOT called, why?

Posted on 2011-09-27
6
Medium Priority
?
335 Views
Last Modified: 2012-08-13
MS IIS6 - my Web Service Extension is in "allow" and NOT called, why?

I mapped this extension to some dll in debug mode.

In one server it is called and producing me some debug file.

In another it is not called or intercepted or whatever else. And I am not getting debug file at all.
Other filters in the "problematic" server also in debug mode but writing files.

In both servers I am Administrator.

What can be the reason here?
0
Comment
Question by:longjumps
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 13

Expert Comment

by:khairil
ID: 36714965
Hi,

I assume the configuration are same on both servers. How about security context of that file?
0
 
LVL 1

Author Comment

by:longjumps
ID: 36816632
What do you mean by "security context of that file"?

Configuration on both servers are different.

I deleted all ISAPI filters and prohibited all other  Web Service Extensions.

What can prevent from my Web Service Extension to run?

0
 
LVL 13

Accepted Solution

by:
khairil earned 1500 total points
ID: 36819161
Security context is who can access that file. You can get this by right clicking on that file: Properties -> Security, and examine security list there.

Deleting "needed" isapi filter might produce other problem. EventViewer and IIS log is good place to look if something happen on IIS.
0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 
LVL 1

Author Comment

by:longjumps
ID: 37030663
In "Security context" there is Everyone that can do everything.

Please advice how can I check this issue.
0
 
LVL 13

Assisted Solution

by:khairil
khairil earned 1500 total points
ID: 37035496
Try add IUSR user to the access list.
0
 
LVL 1

Author Closing Comment

by:longjumps
ID: 37057423
not exact solution.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
This Micro Tutorial will give you a basic overview of Windows DVD Burner through its features and interface. This will be demonstrated using Windows 7 operating system.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question