Understanding Machine-Level and User-Level RSA Key Containers (2024)

  • Article

The RsaProtectedConfigurationProvider class can use either machine-level or user-level RSA key containers. Microsoft Windows makes machine-level key containers available to all users, whereas a user-level key container is available only to the user that created (or imported) the key container.

Comparing Machine-Level and User-Level RSA Key Containers

User-level RSA key containers are stored with the Windows user profile for a particular user and can be used to encrypt and decrypt information for applications that run under that specific user identity. User-level RSA key containers can be useful if you want to ensure that the RSA key information is removed when the Windows user profile is removed. However, because you must be logged in with the specific user account that will make use of the user-level RSA key container in order to encrypt or decrypt protected configuration sections, they are inconvenient to use.

Machine-level RSA key containers are available to all users that can log in to a computer, by default, and are the most useful as you can use them to encrypt or decrypt protected configuration sections while logged in with an administrator account. A machine-level RSA key container can be used to protect information for a single application, all the applications on a server, or a group of applications on a server that run under the same user identity. Although machine-level RSA key containers are available to all users, they can be secured with NTFS Access Control Lists (ACLs) so that only required users can access them.

Note

It is recommended that you only secure sensitive information using protected configuration on file systems formatted using NTFS, so that you can restrict access to encryption key information using ACLs.

As there is little benefit from using user-level RSA key containers, it is recommended that you use machine-level RSA key containers when protecting configuration sections using the RsaProtectedConfigurationProvider provider. When you create an RSA key container to protect configuration information for one or more applications, it is recommended that you restrict the access to the machine-level RSA key container using the Aspnet_regiis.exe tool, with the -pa option to add access to the key for a particular identity and the -pr option to remove access to the key. For more information on how to set or determine the identity of an ASP.NET application, see ASP.NET Impersonation. For more information on granting read access to an RSA key container, see Importing and Exporting Protected Configuration RSA Key Containers.

When creating, exporting, importing, or deleting an RSA key container using the Aspnet_regiis.exe tool, you must specify whether the RSA key container is a machine-level key container or a user-level key container. You identify an RSA key container as a user-level key container with the -pku option; otherwise, the RSA key container is considered a machine-level container.

See Also

Tasks

Walkthrough: Creating and Exporting an RSA Key Container

Other Resources

Encrypting Configuration Information Using Protected Configuration

Understanding Machine-Level and User-Level RSA Key Containers (2024)
Top Articles
1964 Quarter Value & Guide
...
SZA: Weinen und töten und alles dazwischen
Craigslist Free En Dallas Tx
How Much Does Dr Pol Charge To Deliver A Calf
Ret Paladin Phase 2 Bis Wotlk
Limp Home Mode Maximum Derate
Find All Subdomains
2024 Fantasy Baseball: Week 10 trade values chart and rest-of-season rankings for H2H and Rotisserie leagues
877-668-5260 | 18776685260 - Robocaller Warning!
Fusion
Merlot Aero Crew Portal
Embassy Suites Wisconsin Dells
Cosentyx® 75 mg Injektionslösung in einer Fertigspritze - PatientenInfo-Service
Dark Souls 2 Soft Cap
Craigslistdaytona
Babyrainbow Private
Classroom 6x: A Game Changer In The Educational Landscape
Calmspirits Clapper
Jc Post News
Jesus Calling Oct 27
The Superhuman Guide to Twitter Advanced Search: 23 Hidden Ways to Use Advanced Search for Marketing and Sales
N2O4 Lewis Structure & Characteristics (13 Complete Facts)
Inside the life of 17-year-old Charli D'Amelio, the most popular TikTok star in the world who now has her own TV show and clothing line
Bj Alex Mangabuddy
라이키 유출
Zack Fairhurst Snapchat
The Pretty Kitty Tanglewood
Concordia Apartment 34 Tarkov
Jeff Now Phone Number
BMW K1600GT (2017-on) Review | Speed, Specs & Prices
Scream Queens Parents Guide
Mandy Rose - WWE News, Rumors, & Updates
Sam's Club Gas Price Hilliard
Walgreens On Bingle And Long Point
Nk 1399
Netspend Ssi Deposit Dates For 2022 November
Enduring Word John 15
Sams Gas Price Sanford Fl
Ullu Coupon Code
UPS Drop Off Location Finder
Gerber Federal Credit
Netherforged Lavaproof Boots
Federal Student Aid
Page 5662 – Christianity Today
Www Craigslist Com Brooklyn
„Wir sind gut positioniert“
How to Quickly Detect GI Stasis in Rabbits (and what to do about it) | The Bunny Lady
3 bis 4 Saison-Schlafsack - hier online kaufen bei Outwell
Clock Batteries Perhaps Crossword Clue
Doelpuntenteller Robert Mühren eindigt op 38: "Afsluiten in stijl toch?"
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6769

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.