how to get orignal token after Elevation?

  • Thread starter Thread starter Guest
  • Start date Start date
dispaly name said:
after the Elevation of app how can i get the unElevation user's token?



hope your reply 3Q

I'm going on the assumption that you're talking about running an application
as Administrator in UAC (or right clicking and selecting "Run As
Administrator"). If so, you're still in the credentials of the lower user
(limited user). But, you're running the application in a shell as the
Administrator. If your regular user is a Computer Administrator, then
you're basically unlocking your administrative powers for the specific
application.

However, if your user is a limited (or Standard) user, then you are logging
into the shell as a Computer Administrator, then using that user's
Administrative powers to run the application.

But, for all intended purposes, the rest of your computer is still in the
limited user's credentials. It's just the "Secure Shell" that is elevated.
This is similar to the *nix's use of su (super User). You are running as a
limited user, but when necessary you log in for a specific application
(Secure shell) as super user. The rest of the applications that are running
(or any that you open while you have the secure shell running) are running
as the limited user (unless they require the secure shell also).

HTH.



--
Patrick Dickey.

smile... someone out there cares deeply for you.
http://www.microsoft.com/protect
http://update.microsoft.com
http://www.pats-computer-solutions.com
 
thank you for your help !
what i want to is to create a process with the Elevationed app,but when the
new process writes the current user regkey , the admin's current user'key is
modified.
in fact i want to write the logon user'regkey.how to do it? the question in
the title is used for getting the orignal token as param and passing it to
the function "CreateProcessAsUser()"
 
Back
Top