IIS offers enhancements for dynamic content, especially ASP.NET. In IIS 7 and above, the ASP.NET runtime extensibility model is integrated into the core server. This allows developers to fully extend IIS with the rich functionality of ASP.NET 2.0 or higher and the .NET Framework, instead of using lower-level C++ APIs. Existing ASP.NET applications will benefit from the closer integration by being able to use existing features such as forms authentication, roles, and output caching for all types of content, not just .aspx pages.
To learn more about some of the key features and benefits of ASP.NET integration with IIS, see the Core Web Server Overview. For information about and how to install the .NET Framework 3.5, see https://www.microsoft.com/net/ or the ASP.NET community site.
The following settings were used on the Web server as part of the shared hosting architecture mentioned in the “Planning The Shared Hosting Architecture” article in Hosting Guidance. To learn more about why these settings are recommended and for additional details about how to configure them, download the ASP.NET 4 Hosting Deployment Guide.
Configuring Trust Levels
Trust levels let you define security rules for ASP.NET. They define what types of operations an application can perform, such as reading from disk or accessing the registry. The recommended trust level is Medium, which allows many common operations but restricts many of the dangerous applications. If you need to permit more operations than Medium trust allows, you should create a custom trust level.
To configure a custom trust level and configure additional permissions
- Navigate to the
%windir%Microsoft.NETFramework version CONFIGdirectory.
- Copy the Medium trust policy file, web_mediumtrust.config, to create a new policy file in the same directory
- Rename the file to indicate that it is a custom trust level, for example, web_CustomTrust.config.
Open the new file, web_CustomTrust.config, and locate the WebPermission section.
version="1" <ConnectAccess> <URI uri="$OriginHost$" /> </ConnectAccess> </IPermission>
Edit WebPermission so that the ConnectAccess element is removed and Unrestricted is set to true.
- Comment out PrintingPermission and EnvironmentPermission, unless it is known that they are needed for the shared hosting environment.
Add the new
<trustLevel>element to the
<securityPolicy>section of the Web.config file, as shown below:
<system.web> <securityPolicy> <trustLevel name="Full" policyFile="internal" /> <trustLevel name="High" policyFile="web_hightrust.config" /> <trustLevel name="Medium" policyFile="web_mediumtrust.config" /> <trustLevel name="Low" policyFile="web_lowtrust.config" /> <trustLevel name="Minimal" policyFile="web_minimaltrust.config" /> <trustLevel name="Custom" policyFile="web_CustomTrust.config" /> </securityPolicy> <trust level="Custom" originUrl="" /> </system.web> </location>
Lock the trust level so that it cannot be changed by applications on the server, by setting the location allowOverride element to false.
<location allowOverride="false"> <system.web> <securityPolicy> <trustLevel name="Full" policyFile="internal" /> <trustLevel name="High" policyFile="web_hightrust.config" /> <trustLevel name="Medium" policyFile="web_mediumtrust.config" /> <trustLevel name="Low" policyFile="web_lowtrust.config" /> <trustLevel name="Minimal" policyFile="web_minimaltrust.config" /> <trustLevel name="Custom" policyFile="web_CustomTrust.config" /> </securityPolicy> <trust level="Custom" originUrl="" /> </system.web> </location>
Configuring Content to be Served from a Remote File Server
When configuring ASP.NET to work with content that is stored on a remote file server, a few additional steps are required.
When IIS receives content from a remote file server, it impersonates the authenticated user. This is either the user specifically set as the virtual directory user, or if one is not specified, the anonymous user. IIS guidance states that the application pool user should be used as the anonymous user, so in this case the impersonated identity is the application pool identity. Using one identity for all access (anonymous, application pool, and virtual directory) greatly simplifies a deployment.
To run some ASP.NET applications from a remote file server, the impersonated user must have access to the Windows temp and the temporary compilation directories.
To serve ASP.NET content from a file server share
- Grant permission for all application pool identities to the
%windir%Tempdirectory by editing the ACLs for the folder.
Add a Code Access Security (CAS) policy to allow ASP.NET appropriate access to the file server share. To do this, open a command prompt and run the following command:
%windir%Microsoft.NETFrameworkv2.0.50727caspol -m -ag 1. -url "file://\remotefileservercontent$*" FullTrust
Configuring Garbage Collector Settings
The .NET framework uses automatic garbage collection to manage memory for all applications. When the garbage collector (GC) decides that sufficient garbage has accumulated and that it is efficient to do so, it performs a collection to free some memory. This process is fully automatic, but there are settings that can make the process more efficient.
For more information about the GC, see “Chapter 5 – Improving Managed Code Performance” and look at the section Garbage Collection Explained.
Enabling the Workstation Garbage Collector
By default, the Server GC is used by the .NET Framework to optimize speed and CPU load. For shared hosting, where memory is more often the constraint for a number of active sites, the Workstation GC should be used. The Workstation GC optimizes for memory.
To learn more about this setting, see the KB article, “You may receive an error message, or the computer stops responding, when you host Web applications that use ASP.NET on a computer that is running Windows Server 2003″.
Disabling the Concurrent Garbage Collector
There are 3 versions of the GC: Server, Workstation with concurrent enabled, and Workstation with concurrent disabled. The concurrent Workstation GC is intended for client scenarios. Just as the Server GC prioritizes throughput and scalability at a memory cost, the concurrent Workstation GC prioritizes responsiveness at a memory cost. To optimize for memory, disable concurrent garbage collection when you use the Workstation GC.
Enabling the gcTrimCommitOnLowMemory Setting
Because the GC holds on to memory for future allocations, its committed space can be more than what is strictly needed. This space can be reduced to accommodate situations when there is a heavy load on system memory. When this setting is enabled, the GC evaluates the system memory load and enters a trimming mode when the load reaches 90%. It maintains the trimming mode until the load drops under 85%. When conditions permit, the GC can decide that the setting will not help the application and ignore it.
To configure the GC settings
- Navigate to the
Open the aspnet.config file, and locate the
<gcServer>element. If the element does not exist, create an entry using Step 3.
<configuration> <runtime> <gcServer enabled="true"/> </runtime> </configuration> ...
Add the following three elements within the
<configuration> <runtime> <gcServer enabled="false" />
<gcConcurrent enabled="false" /> <gcTrimCommitOnLowMemory enabled="true" /> </runtime> </configuration> ...
- Save the file and close it.