R
Robinson
May I be so bold as to run a scenario by you and solicit some advice on the
best way to proceed?
I have a database (SQL Server), which stores paths of image files on disk
(on the server). I have a client program on a remote machine that runs
queries on the server, fetching the image files by getting back a table with
the paths in and using the file system to copy or read them over. The
security headache I have at the moment is how to ensure that the user of my
program doesn't have any permissions on the remote filesystem, but that my
client software at certain moments (when it's reading/writing the
repository), does. Can I "elevate" my process to a different user at
various points in the code and then reduce it back again?
Thanks,
Robin
best way to proceed?
I have a database (SQL Server), which stores paths of image files on disk
(on the server). I have a client program on a remote machine that runs
queries on the server, fetching the image files by getting back a table with
the paths in and using the file system to copy or read them over. The
security headache I have at the moment is how to ensure that the user of my
program doesn't have any permissions on the remote filesystem, but that my
client software at certain moments (when it's reading/writing the
repository), does. Can I "elevate" my process to a different user at
various points in the code and then reduce it back again?
Thanks,
Robin