IBM Support

IIS 6.0 - File permissions for the WebSphere Application Server Web server plug-in

Troubleshooting


Problem

In some cases, problems observed with the loading or run-time function of the WebSphere Application Server Web server plug-in for Internet Information Services (IIS) may be due to file permissions. What file permissions are required for the plug-in to function properly with IIS 6.0 on Microsoft Windows Server 2003?

Resolving The Problem


Tab navigation




Determining the IIS Application Pool Identity

To verify that the plug-in is configured with the correct file permissions it is first necessary to determine the Windows account that is being used to load the plug-in. At run-time, this account is referred to as an IIS Worker Process Identity. Within the IIS configuration itself, it is known as the Application Pool Identity.

Perform the following steps to determine the Application Pool Identity (account) being used to load the plug-in:

  1. Launch the IIS Administrative Console.

  2. From the console tree, expand the "Server" node , then expand the "Web Sites" node. Right-click the web site intended for use with the plug-in and choose Properties.

  3. Select the "Home Directory" tab and make a note of the "Application pool" field value, then click Cancel.

  4. From the console tree, expand the "Application Pools" node. Right-click the Application Pool name from step 3 and choose Properties. Select the "Identity" tab and make a note of the active account. This is the account which is responsible for loading the plug-in.

The following table shows each of the predefined IIS 6.0 Application Pool Identities and their corresponding File System Account names:

Application Pool Identity File System Account Name
Network Service NETWORK SERVICE
Local Service LOCAL SERVICE
Local System SYSTEM



NTFS Permissions for the plug-in

The following table lists the primary plug-in related files / folders and the minimum NTFS Permissions required for the Application Pool Identity account identified above:

* NOTE: The "Special Permissions" values are the granular level permissions which comprise the main "Permissions" values.

File / Folder

Permissions

Special Permissions





Plug-in binary file

iisWASPlugin_http.dll

- Read & Execute
- Read

- Traverse Folder / Execute File
- List Folder / Read Data
- Read Attributes
- Read Extended Attributes
- Read Permissions





Plug-in location file

plugin-cfg.loc

- Read
- List Folder / Read Data
- Read Attributes
- Read Extended Attributes
- Read Permissions





Plug-in config file

plugin-cfg.xml

- Read
- List Folder / Read Data
- Read Attributes
- Read Extended Attributes
- Read Permissions





Plug-in keystore files

plugin-key.*

- Read
- List Folder / Read Data
- Read Attributes
- Read Extended Attributes
- Read Permissions





Plug-in log directory

[plugins_install_root]\logs\[website]

- Read
- Write

- List Folder / Read Data
- Read Attributes
- Read Extended Attributes
- Create Files / Write Data
- Create Folders / Append Data
- Write Attributes
- Write Extended Attributes
- Read Permissions

Default File Locations

plugins_install_root = C:\Program Files\IBM\WebSphere\Plugins

..\bin\IIS_webserver1\iisWASPlugin_http.dll
..\bin\IIS_webserver1\plugin-cfg.loc
..\config\webserver1\plugin-cfg.xml
..\config\webserver1\plugin-key.kdb
..\config\webserver1\plugin-key.sth
..\config\webserver1\plugin-key.rdb
..\config\webserver1\plugin-key.crl
..\logs\webserver1\



Verifying Effective Permissions

Because permissions can be granted both explicitly and via group membership, to estimate the current total permissions for an account on a file or folder, it is recommended to check the "Effective Permissions" for that account.



Perform the following steps to check "Effective Permissions":
  1. Right-click the desired file or folder and choose Properties.

  2. Select the 'Security' tab and click on the 'Advanced' button.

  3. Select the 'Effective Permissions' tab and click the 'Select' button.

  4. Ensure that 'Object Types' has all three values selected (User, Group, or Built-in security principal) and that 'Locations' is set to the local machine.

  5. In the 'Enter the object name...' field, type in the Application Pool Identity's "File System Account Name". Refer to the table referenced under the 'Determining the IIS Worker Process ID' section for a listing of these account names.

  6. Click the 'Check Names' button and ensure the typed value becomes underlined. Then click OK.

  7. The resulting list of Effective permissions shows which, if any, special permissions are granted for the given account. Refer to the "Special Permissions" listed in the table above for comparison.

[{"Product":{"code":"SSEQTP","label":"WebSphere Application Server"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"Plug-in","Platform":[{"code":"PF033","label":"Windows"}],"Version":"8.5;8.0;7.0","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
15 June 2018

UID

swg21443292