How to Impersonate a user in managed code?

前端 未结 5 1924
逝去的感伤
逝去的感伤 2020-12-09 00:29

Given a username and password how do i impersonate that user and run some code as that user.

And by managed i mean without pinvokes or dllimports

相关标签:
5条回答
  • 2020-12-09 01:09

    This is the wrapper class we created that has worked on several different Windows platforms:

    public class Impersonator
    {
        // constants from winbase.h
        public const int LOGON32_LOGON_INTERACTIVE = 2;
        public const int LOGON32_LOGON_NETWORK = 3;
        public const int LOGON32_LOGON_BATCH = 4;
        public const int LOGON32_LOGON_SERVICE = 5;
        public const int LOGON32_LOGON_UNLOCK = 7;
        public const int LOGON32_LOGON_NETWORK_CLEARTEXT = 8;
        public const int LOGON32_LOGON_NEW_CREDENTIALS = 9;
    
        public const int LOGON32_PROVIDER_DEFAULT = 0;
        public const int LOGON32_PROVIDER_WINNT35 = 1;
        public const int LOGON32_PROVIDER_WINNT40 = 2;
        public const int LOGON32_PROVIDER_WINNT50 = 3;
    
        [DllImport("advapi32.dll", SetLastError=true)]
        public static extern int LogonUserA(String lpszUserName, 
            String lpszDomain,
            String lpszPassword,
            int dwLogonType, 
            int dwLogonProvider,
            ref IntPtr phToken);
        [DllImport("advapi32.dll", CharSet=CharSet.Auto, SetLastError=true)]
        public static extern int DuplicateToken(IntPtr hToken, 
            int impersonationLevel,  
            ref IntPtr hNewToken);
    
        [DllImport("advapi32.dll", CharSet=CharSet.Auto, SetLastError=true)]
        public static extern bool RevertToSelf();
    
        [DllImport("kernel32.dll", CharSet=CharSet.Auto)]
        public static extern  bool CloseHandle(IntPtr handle);
    
        public static WindowsImpersonationContext LogOn(string userName, string password)
        {
            return LogOn(userName, password, "");
        }
    
        public static WindowsImpersonationContext LogOn(string userName, string password, string domain)
        {
            WindowsIdentity tempWindowsIdentity;
            WindowsImpersonationContext impersonationContext;
            IntPtr token = IntPtr.Zero;
            IntPtr tokenDuplicate = IntPtr.Zero;
    
            if(RevertToSelf())
            {
                if (LogonUserA(userName, domain, password, LOGON32_LOGON_NEW_CREDENTIALS,
                    LOGON32_PROVIDER_DEFAULT, ref token) != 0)
                {
                    if (DuplicateToken(token, 2, ref tokenDuplicate) != 0)
                    {
                        tempWindowsIdentity = new WindowsIdentity(tokenDuplicate);
                        impersonationContext = tempWindowsIdentity.Impersonate();
                        if (impersonationContext != null)
                        {
                            CloseHandle(token);
                            CloseHandle(tokenDuplicate);
                            return impersonationContext;
                        }
                    }
                }
                else
                {
                    var win32 = new Win32Exception(Marshal.GetLastWin32Error());
                    //throw new Exception(string.Format("{0}, Domain:{1}, User:{2}, Password:{3}",
                    //    win32.Message, domain, userName, password));
                    throw new Exception(win32.Message);
                }
            }
            if(token!= IntPtr.Zero)
                CloseHandle(token);
            if(tokenDuplicate!=IntPtr.Zero)
                CloseHandle(tokenDuplicate);
            return null; // Failed to impersonate
        }
    
        public static bool LogOff(WindowsImpersonationContext context)
        {
            bool result = false;
            try
            {
                if (context != null)
                {
                    context.Undo();
                    result = true;
                }
            }
            catch
            {
                result = false;
            }
            return result;
        }
    }
    
    0 讨论(0)
  • 2020-12-09 01:11

    See ImpersonationHelper of Is it possible to safely get a SecureString value from VB .NET?. The code is production ready and robust.

    It supports IDisposable, contains a RunAs method (which is invaluable), passwords are handled as SecureString, and other little helpful goodies. I also provided the testing code for both the ImpersonationHelper class with is extremely helpful for troubleshooting, and their are SecureString extenstion methods that come in handy.

    0 讨论(0)
  • 2020-12-09 01:18

    There's a similar question with a great answer here.

    Have a look at WindowsImpersonationContext for some more information (also there's another great code sample there)

    0 讨论(0)
  • 2020-12-09 01:22

    I've boiled it down to two simple methods:

    public bool ImpersonateValidUser(String userName, String domain, String password)
    public void UndoImpersonation()
    

    You can directlyh copy/paste the class below and use it in your project:

        class ImpersonationContext
        {
            [DllImport("advapi32.dll")]
            public static extern int LogonUserA(String lpszUserName,
                String lpszDomain,
                String lpszPassword,
                int dwLogonType,
                int dwLogonProvider,
                ref IntPtr phToken);
            [DllImport("advapi32.dll", CharSet = CharSet.Auto, SetLastError = true)]
            public static extern int DuplicateToken(IntPtr hToken,
                int impersonationLevel,
                ref IntPtr hNewToken);
    
            [DllImport("advapi32.dll", CharSet = CharSet.Auto, SetLastError = true)]
            public static extern bool RevertToSelf();
    
            [DllImport("kernel32.dll", CharSet = CharSet.Auto)]
            public static extern bool CloseHandle(IntPtr handle);
    
            public const int LOGON32_LOGON_NEW_CREDENTIALS = 9;
            public const int LOGON32_LOGON_INTERACTIVE = 2;
            public const int LOGON32_PROVIDER_DEFAULT = 0;
            public const int LOGON32_PROVIDER_WINNT50 = 3;
            WindowsImpersonationContext impersonationContext;
    
            public bool ImpersonateValidUser(String userName, String domain, String password)
            {
                WindowsIdentity tempWindowsIdentity;
                IntPtr token = IntPtr.Zero;
                IntPtr tokenDuplicate = IntPtr.Zero;
    
                if (RevertToSelf())
                {
                    if (LogonUserA(userName, domain, password, LOGON32_LOGON_NEW_CREDENTIALS,
                        LOGON32_PROVIDER_WINNT50, ref token) != 0)
                    {
                        if (DuplicateToken(token, 2, ref tokenDuplicate) != 0)
                        {
                            tempWindowsIdentity = new WindowsIdentity(tokenDuplicate);
                            impersonationContext = tempWindowsIdentity.Impersonate();
                            if (impersonationContext != null)
                            {
                                CloseHandle(token);
                                CloseHandle(tokenDuplicate);
                                return true;
                            }
                        }
                    }
                }
                if (token != IntPtr.Zero)
                    CloseHandle(token);
                if (tokenDuplicate != IntPtr.Zero)
                    CloseHandle(tokenDuplicate);
                return false;
            }
    
            public void UndoImpersonation()
            {
                impersonationContext.Undo();
            }
        }
    
    0 讨论(0)
  • 2020-12-09 01:31

    All of the examples I've seen fail to take into account the fact that the logon type is not a one size fits all solution.

    For example this will only work if the user you are impersonating has permission to logon to the target system. Not always the case when accessing a remote SQL Server box. LOGON32_LOGON_INTERACTIVE

    NetworkClearText is the only one that works consistently for use with SQL Server connections. - No clear text does not mean it is passing credentials in an insecure manner.

    When on a workgroup and you need to impersonate a domain user NewCredentials is the one that works. (not tested with SQL Server connections)

    0 讨论(0)
提交回复
热议问题