Required Access Control Lists (ACLs) for ASP.NET

Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1

The following table shows which type of access permissions ASP.NET must have in order to access the listed locations.

Location Access type Account Comments

installroot\ASP.NET Temporary Files

Read/Write/Execute

Process or configured impersonation.

This is the location for dynamically compiled files. Beneath this location, application code generation takes place in a discrete directory for each application. The root location itself can be configured using the tempDir attribute of the <compilation> section.

systemroot\assembly

Read/Execute

Process or configured impersonation.

This is the location of the global assembly cache.

systemroot\system32

Read/Execute

Process

Contains system DLLs loaded by the .NET Framework.

systemroot\temp

Read/write/delete

Process

Used for XML Web services support.

userprofile directory

Read/write

Process

Used by the global assembly cache lock files and the common language runtime security configuration caching mechanism. If the user profile directory for the account does not exist, ASP.NET will use the default userprofile directory.

application directory

Read

Process or configured impersonation.

This is the location for application files.

installroot hierarchy

Read/Execute

Process or configured impersonation

ASP.NET must be able to access the system assemblies referenced in the Machine.config file in the config subdirectory under installroot.

Default Web Site monitoring

Read

Process

Used for file change notification monitoring.