Operating systems that manage computing devices can provide various services to system programs, application programs, external programs, and so forth. An example of such an operating system service that provides Internet services (e.g., MICROSOFT INTERNET INFORMATION SERVER) is commonly referred to as a “web server.” A web server may contain several application pools, each of which is a collection of one or more web applications. Each web application may operate in one or more processes that the operating system associates with the web server. As an example, the web server may start a process for each web application. Subsequent requests to the web application may be handled by the process started for that web application.
Each process executes in the security context of a user account. User accounts (or simply “accounts”) can have various security attributes. While some accounts have increased security attributes, such as an administrator account, other accounts have reduced security attributes, such as an Internet user account. The security attributes can indicate to what operating system resources (or other resources) the account has various permissions. Web applications inherit the security attributes of the processes in which they execute. Thus, system administrators generally configure specific accounts for each web application. As an example, system administrators may configure accounts such that one web application cannot interact with another web application and cannot access other resources of the operating system on which the web server operates. Typically, accounts associated with web applications are provided very minimal permissions so that a web application cannot inadvertently or maliciously interact with other aspects of the web server, such as other web applications. The accounts are conventionally created and managed in relation to the web server or a network security resource, such as ACTIVEDIRECTORY.
User accounts can be associated with security tokens, such as security identifiers (SIDs). A SID is a value of variable length that can be used to identify a security principal or security group in operating systems, such as a user account. The SID can be associated with various security attributes so that, for example, different SIDs can have different permissions on resources of the operating system. Typically, a SID with minimal security attributes is created for processes that handle web applications.
Managing accounts can be problematic. System administrators need to ensure that each account that is added has the correct set of security attributes. Otherwise, a web application may be able to exploit a security vulnerability, such as to take actions that are undesirable or harmful to the web server or other web applications. System administrators may need to ensure that passwords associated with these accounts satisfy various security policies, such as needing to be changed periodically.
A system administrator of an Internet Service Provider (ISP) may administer hundreds of web servers. Thus, when deploying a web application to multiple web servers, the system administrator generally configures each web server or employs a network security resource to set up accounts for the web application. Each such account then needs to be administered, such as to comply with various security policies. ISPs that host many web applications may need accounts for each web application, and so deploying web applications can become quite tedious and prone to error.
A secure web hosting system is provided. The secure web hosting system can facilitate application deployment by configuring user accounts automatically so as to provide secure isolation of application pools. The secure web hosting system can automatically create a security token, such as a security identifier (SID), for each web application or application pool (hereinafter, “application”). The created SID can be independent of the computer system and the user account in which the web server operates. The secure web hosting system can employ a one-way hash function to create the SID based on an application name indicated in a configuration file the web server loads to configure applications and can provide the SID with minimal security attributes sufficient for the application. The web server loads the configuration file when the web server starts or after the configuration file changes, such as when a new application is added to the configuration file. By creating a unique SID for each application when the web server loads the configuration file, system administrators can be relieved of their responsibility to manage user accounts for applications. Because system administrators no longer need to create accounts for each application, they can easily deploy applications by performing a simple file copy operation from a storage to each web server.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
A secure web hosting system is provided. In various embodiments, the secure web hosting system facilitates application deployment by configuring user accounts automatically so as to provide secure isolation of application pools. The secure web hosting system can automatically create a security token, such as a security identifier (SID), for each web application or application pool (hereinafter, “application”). The created SID can be independent of the computer system and the user account in which the web server operates. The secure web hosting system can create the SID based on an application name indicated in a configuration file that the web server loads to configure applications and can provide the SID with minimal security attributes sufficient for the application. The web server loads the configuration file when the web server starts or after the configuration file changes, such as when a new application is added to the configuration file. By creating a unique SID for each application when the web server loads the configuration file, system administrators can be relieved of their responsibility to manage user accounts for applications. The secure web hosting system may employ types of security tokens other than SIDs in various embodiments.
In various embodiments, the secure web hosting system applies a one-way hash function, such as a Secure Hash Algorithm, to the name of the application or application pool to create a hash value and may include the hash value as part of the SID it creates for the application. The SID for an application can begin with a prefix, such as “S-1-5-81-,” and end with a suffix comprising the hash value. An example of a SID the secure web hosting system creates can be “S-1-5-81-12345-123456.” The prefix can identify a service, such as the web server. The suffix can uniquely identify the application. Because the SID for an application is unique and independent of the computer system and account employed by the web server, security attributes associated with each SID can also be independent of the computer system, the account employed by the web server, and the applications. Because the SID is automatically created based on the application name, the applications can be easily deployed to any number of computer systems. The secure web hosting system executing on each such computer system will create the SIDs automatically when the web server loads the configuration file that lists the applications. Moreover, when an application is removed from a web server (e.g., by removing the application from the configuration file), the secure web hosting system automatically removes the SID from the associated computer system, such as by not creating the SID when the application starts. Thus, the secure web hosting system relieves system administrators from managing accounts for applications.
In some embodiments, the configuration file is stored in a configuration store that includes multiple configuration files. The web server may load one or more configuration files from the configuration store when the web server starts or when the configuration file changes. The configuration files may be human-readable and can be defined using an extensible markup language (XML). Thus, a system administrator can configure a web server using various tools, such as a simple file editing tool or a configuration management tool. The configuration store and the configuration files contained therein may only be accessible by system administrators and other user accounts having high security privileges, such as an operating system's SYSTEM account and the account employed by the web server and the secure web hosting system.
When the web server loads a configuration file, it may request the secure web hosting system to create accounts. As an example, the secure web hosting system may create a SID for the applications listed in the configuration file. The secure web hosting system may also create additional accounts, as indicated in the configuration file. The secure web hosting system may specify security attributes associated with each account it creates. As an example, the secure web hosting system may specify that the SID it creates for each application has rights and permissions relating to various operating system resources and subsystems that the process handling the application may require, such as portions of the registry, file system, and so forth. In some embodiments, the SIDs the secure web hosting system creates require no password so that a user who requests an application's page (e.g., web page) from the web server is not prompted for a password.
In some embodiments, the secure web hosting system may detect that the configuration file has changed and may take actions relating to SIDs it creates. As an example, the secure web hosting system may remove SIDs it previously created but are no longer necessary because the associated application is no longer listed in the configuration file. Alternatively, the secure web hosting system may create additional SIDs relating to applications newly added to the configuration file.
Because system administrators no longer need to create accounts for each application, they can easily deploy applications by performing a simple file copy operation from a storage to each web server. The secure web hosting system may then automatically create SIDs for each application listed in the configuration file without further intervention. The secure web hosting system may also manage the accounts, such as to remove SIDs when they are no longer needed. Because these SIDs may not need passwords, system administrators are relieved of an additional burden of account management. Thus, the secure web hosting system facilitates application deployment and sets up user accounts automatically so as to provide secure isolation of application pools.
The secure web hosting system will now be described with reference to the figures.
The computing devices on which the secure web hosting system operates may include one or more central processing units, memory, input devices (e.g., keyboard and pointing devices), output devices (e.g., display devices), storage devices (e.g., disk drives), and network devices (e.g., network interfaces). The memory and storage devices are computer-readable media that may store instructions that implement the secure web hosting system. In addition, the data structures and message structures may be stored or transmitted via a data transmission medium, such as a signal on a communications link. Various communications links may be employed, such as the Internet, a local area network, a wide area network, or a point-to-point dial-up connection.
The secure web hosting system may use various computing systems or devices including personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, programmable consumer electronics, electronic game consoles, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The secure web hosting system may also provide its services to various computing systems, such as personal computers, cell phones, personal digital assistants, consumer electronics, home automation devices, and so on.
The secure web hosting system may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, and so on that perform particular tasks or implement particular abstract data types. Typically, the functionality of the program modules may be combined or distributed as desired in various embodiments.
The isolation service 206 provides secure isolation services to the web server. As an example, the isolation service can create accounts for web applications when so requested by the secure web hosting system. The isolation service may execute as a privileged “local system” process in the operating system that executes within the TCB. In some embodiments, the isolation service can employ the LSA to create SIDs based on the application name.
The configuration container 208 can contain one or more configuration files. As an example, the configuration container can include configuration files that the web server loads when it starts. Configuration files are described in further detail below in relation to
At block 416, the routine creates accounts for the application. As an example, the routine causes the LSA to create the SIDs returned by the generate_SID subroutine. At block 418, the routine sets permissions for the created accounts. The routine then continues at block 406.
Those skilled in the art will appreciate that the logic illustrated in
At block 608, the routine generates a hash value based on the application name received at block 604. In some embodiments, the routine employs a secure hash algorithm and provides an indication of the application's name to the algorithm so that a hash value can be generated based on the name. Because the hash value is not specific to any spoken language, the account that is created for localized versions of applications does not need to be localized.
At block 610, the routine adds the hash value to the created SID, such as by adding the hash value as a suffix to the SID. At block 612, the routine returns. In some embodiments, the routine may return the created SID value.
Additional aspects of the secure web hosting system are described in commonly assigned patent application Ser. No. 11/131,431, entitled “Method and System for Limiting Rights of Services” and filed on May 16, 2005, the disclosure of which is incorporated herein by reference in its entirety.
Although use of the secure web hosting system is described in relation to web servers, the concept can be equally applied to isolating third-party stored procedures in database servers, such as MICROSOFT SQL SERVER, isolating COM or DCOM objects in MICROSOFT WINDOWS, and so forth. The secure web hosting system may also be applied to isolate dynamic link libraries that are loaded by applications, such as when loading extensions to the applications that are provided by third parties.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. Accordingly, the invention is not limited except as by the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
5841870 | Fieres et al. | Nov 1998 | A |
5870473 | Boesch et al. | Feb 1999 | A |
6148083 | Fieres et al. | Nov 2000 | A |
6279111 | Jensenworth et al. | Aug 2001 | B1 |
6308273 | Goertzel et al. | Oct 2001 | B1 |
6505300 | Chan et al. | Jan 2003 | B2 |
6594671 | Aman et al. | Jul 2003 | B1 |
7031320 | Choe | Apr 2006 | B2 |
7256715 | Langhammer | Aug 2007 | B1 |
7350204 | Lambert et al. | Mar 2008 | B2 |
7433355 | Wilson et al. | Oct 2008 | B2 |
7443841 | Davis | Oct 2008 | B2 |
7564825 | Olivereau et al. | Jul 2009 | B2 |
7602785 | Dharmapurikar et al. | Oct 2009 | B2 |
7640578 | Vasnani et al. | Dec 2009 | B2 |
20020019941 | Chan et al. | Feb 2002 | A1 |
20020099952 | Lambert et al. | Jul 2002 | A1 |
20020118682 | Choe | Aug 2002 | A1 |
20040006693 | Vasnani et al. | Jan 2004 | A1 |
20050091192 | Probert et al. | Apr 2005 | A1 |
20050091535 | Kavalam et al. | Apr 2005 | A1 |
20050091658 | Kavalam et al. | Apr 2005 | A1 |
20050141519 | Rajgopal et al. | Jun 2005 | A1 |
20050175010 | Wilson et al. | Aug 2005 | A1 |
20050251524 | Shukla | Nov 2005 | A1 |
20060259980 | Field et al. | Nov 2006 | A1 |
20060265714 | Bissett et al. | Nov 2006 | A1 |
20060277415 | Staring et al. | Dec 2006 | A1 |
20070038994 | Davis et al. | Feb 2007 | A1 |
20070067321 | Bissett et al. | Mar 2007 | A1 |
20070094667 | Bissett et al. | Apr 2007 | A1 |
20070136579 | Levy et al. | Jun 2007 | A1 |
20070156842 | Vermeulen et al. | Jul 2007 | A1 |
20080052770 | Ali et al. | Feb 2008 | A1 |
Entry |
---|
Microsoft, Microsoft® Windows® Server 2003 Deployment Kit Deploying Internet Information Services (IIS) 6.0 a Resource Kit Publication, 2003. |
“Access Tokens,” Security, Platform SDK: Authorization, last updated Jan. 2005, Microsoft Corporation, 2 pages, http://msdn.microsoft.com/library/en-us/secauthz/security/access—tokens.asp?frame=true. |
“Platform SDK: Security Glossary—A,” last updated Dec. 2004, Microsoft Corporation, 2 pages, http://msdn.microsoft.com/library/en-us/secgloss/security/a—gly.asp?frame=true. |
“Platform SDK: Security Glossary—S,” last updated Dec. 2005, Microsoft Corporation, 5 pages, http://msdn.microsoft.com/library/en-us/secgloss/security/s—gly.asp?frame=true. |
“Security Identifiers,” Platform SDK: Authorization, last updated Jan. 2005, Microsoft Corporation, 2 pages, http://msdn.microsoft.com/library/en-us/secauthz/security/security—identifiers.asp?frame=true. |
“SHA hash functions,” Information from Answers.com, Computer Desktop Encyclopedia, 1981-2005 Computer Language Company Inc., 6 pages, http://www.answers.com/topic/sha-family. |
Number | Date | Country | |
---|---|---|---|
20080235790 A1 | Sep 2008 | US |