Understanding Machine-Level and User-Level RSA Key Containers (2024)

  • Article

The RsaProtectedConfigurationProvider class can use either machine-level or user-level RSA key containers. Microsoft Windows makes machine-level key containers available to all users, whereas a user-level key container is available only to the user that created (or imported) the key container.

Comparing Machine-Level and User-Level RSA Key Containers

User-level RSA key containers are stored with the Windows user profile for a particular user and can be used to encrypt and decrypt information for applications that run under that specific user identity. User-level RSA key containers can be useful if you want to ensure that the RSA key information is removed when the Windows user profile is removed. However, because you must be logged in with the specific user account that will make use of the user-level RSA key container in order to encrypt or decrypt protected configuration sections, they are inconvenient to use.

Machine-level RSA key containers are available to all users that can log in to a computer, by default, and are the most useful as you can use them to encrypt or decrypt protected configuration sections while logged in with an administrator account. A machine-level RSA key container can be used to protect information for a single application, all the applications on a server, or a group of applications on a server that run under the same user identity. Although machine-level RSA key containers are available to all users, they can be secured with NTFS Access Control Lists (ACLs) so that only required users can access them.

Note

It is recommended that you only secure sensitive information using protected configuration on file systems formatted using NTFS, so that you can restrict access to encryption key information using ACLs.

As there is little benefit from using user-level RSA key containers, it is recommended that you use machine-level RSA key containers when protecting configuration sections using the RsaProtectedConfigurationProvider provider. When you create an RSA key container to protect configuration information for one or more applications, it is recommended that you restrict the access to the machine-level RSA key container using the Aspnet_regiis.exe tool, with the -pa option to add access to the key for a particular identity and the -pr option to remove access to the key. For more information on how to set or determine the identity of an ASP.NET application, see ASP.NET Impersonation. For more information on granting read access to an RSA key container, see Importing and Exporting Protected Configuration RSA Key Containers.

When creating, exporting, importing, or deleting an RSA key container using the Aspnet_regiis.exe tool, you must specify whether the RSA key container is a machine-level key container or a user-level key container. You identify an RSA key container as a user-level key container with the -pku option; otherwise, the RSA key container is considered a machine-level container.

See Also

Tasks

Walkthrough: Creating and Exporting an RSA Key Container

Other Resources

Encrypting Configuration Information Using Protected Configuration

Understanding Machine-Level and User-Level RSA Key Containers (2024)
Top Articles
Strong Customer Authentication: how it works | Uber
Annuities and taxes
English Bulldog Puppies For Sale Under 1000 In Florida
Forozdz
Part time Jobs in El Paso; Texas that pay $15, $25, $30, $40, $50, $60 an hour online
Mountain Dew Bennington Pontoon
Dr Lisa Jones Dvm Married
Co Parts Mn
How Far Is Chattanooga From Here
What Was D-Day Weegy
World of White Sturgeon Caviar: Origins, Taste & Culinary Uses
Craigslist Chautauqua Ny
Dumb Money
Payment and Ticket Options | Greyhound
Comics Valley In Hindi
Marvon McCray Update: Did He Pass Away Or Is He Still Alive?
Publix Super Market At Rainbow Square Shopping Center Dunnellon Photos
20 Different Cat Sounds and What They Mean
Wbiw Weather Watchers
Evil Dead Rise Showtimes Near Regal Sawgrass & Imax
Pirates Of The Caribbean 1 123Movies
Seeking Arrangements Boston
If you have a Keurig, then try these hot cocoa options
About My Father Showtimes Near Copper Creek 9
Accuweather Minneapolis Radar
Cona Physical Therapy
Section 408 Allegiant Stadium
Florence Y'alls Standings
Inmate Search Disclaimer – Sheriff
Wega Kit Filtros Fiat Cronos Argo 1.8 E-torq + Aceite 5w30 5l
O'reilly Auto Parts Ozark Distribution Center Stockton Photos
RUB MASSAGE AUSTIN
#1 | Rottweiler Puppies For Sale In New York | Uptown
Emerge Ortho Kronos
One Main Branch Locator
Craigslist Ludington Michigan
Why I’m Joining Flipboard
Jasgotgass2
Umiami Sorority Rankings
Bob And Jeff's Monticello Fl
2007 Jaguar XK Low Miles for sale - Palm Desert, CA - craigslist
Kutty Movie Net
Santa Clara County prepares for possible ‘tripledemic,’ with mask mandates for health care settings next month
Hkx File Compatibility Check Skyrim/Sse
This Doctor Was Vilified After Contracting Ebola. Now He Sees History Repeating Itself With Coronavirus
Access to Delta Websites for Retirees
The Machine 2023 Showtimes Near Roxy Lebanon
Blog Pch
Dmv Kiosk Bakersfield
Strange World Showtimes Near Century Federal Way
Ubg98.Github.io Unblocked
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6769

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.