windows - UAC Elevation vs. Impersonation -


(skip bottom tldr version.)

ok - have searched (really!) , other uac articles have found seem center on enabling, disabling, detecting or hiding uac. issue not 1 of those, here goes:

my user used have standard dual-token setup in administrators group , uac's consent ui ask me if wanted proceed. now, have separate administrative-level accounts need use, , have authenticate new user. problem having previously, starting app administrator elevated current user, if use credentials of new administrative user, whatever running runs as new user.

as example, elevating cmd , typing whoami command prompt used return normal/current user, returns new administrative user.

this has serious negative consequences - since new user, , administrative-level one, if files created using new user, normal user cannot write or delete them unless manually adjust permissions , ownership. if use development environment under new account (e.g. need debug service or work driver) , rebuild something, end bunch of files cannot manipulate unless administrator. likewise if add file while running new account - scm tool not able update file later unless runs under new administrative account.

also, since profile associated user, things run under different environment (different %username%, %userprofile%, %localappdata%, etc.)

installing application work incorrectly if installed current user (e.g. "just me" option), instead of users. things licensed to/in normal user account fail function if run under new account, because things running new user.

the ripple effects of change getting larger , larger more work it. so...

[tldr] there way temporary elevation of current user without user having normal dual-token setup being in administrative group? or stuck impersonation behavior?


Comments

Popular posts from this blog

c++ - No viable overloaded operator for references a map -

java - Custom OutputStreamAppender not run: LOGBACK: No context given for <MYAPPENDER> -

java - Cannot secure connection using TLS -