- Networker Advanced Network Information App 3 2 10
- Networker Advanced Network Information App 3 2 1 4
- Networker Advanced Network Information App 3 2 12
- Networker Advanced Network Information App 3 2 1 Method
- Networker Advanced Network Information App 3 2 1 3
Погодные приложения, оптимизаторы, дефолтный браузер — от этого всего лучше избавиться.
Networker Advanced Network Information App 3 2 1 Xscope 4 3 1. Networker Advanced Network Information App 3 2 1. ProgramsMajorComputer Networking and Information Technology (AS)CertificatesAdvanced Web Development TechniquesComputer Technical Support. DICOM Network Analyzer by DVTk. File name: DICOMNetworkAnalyzer.exe.
Facebook и другие социальные сети
Социальная сеть Facebook является сегодня самой популярной в мире, поэтому неудивительно, что соответствующее мобильное приложение установлено у огромного количества пользователей. Мобильный клиент позволяет вам получать уведомления о новых лайках, постить фотки своей еды и всегда оставаться на связи с друзьями. Однако взамен это приложение потребляет огромное количество системных ресурсов и значительно уменьшает срок работы мобильного гаджета от батареи. Согласно ежегодному отчёту App Report 2015 AVG Android App Report, именно мобильный клиент Facebook занимает верхние строчки в хит-параде самых прожорливых программ на платформе Android.
Альтернатива. Используйте мобильную версию Facebook в любом современном браузере. Функциональность отличается ненамного, зато отсутствуют раздражающие уведомления и стремительно тающая батарея.
The Weather Channel и другие погодные приложения
The Weather Channel — отличный пример того, как на самой простой функции — отображении прогноза погоды — разработчики умудряются выстроить целый мегакомбайн. Здесь вы увидите и анимированные обои, и метеорологические карты, и букет интерактивных виджетов, и бог знает что ещё. Всё это хозяйство сидит в оперативной памяти устройства, каждые пять минут стучится в интернет и, разумеется, самым бессовестным образом съедает заряд вашей батареи.
Альтернатива. Выгляните в окошко — вы получите гораздо более надёжную информацию, чем то, что показывает виджет рабочего стола. Если необходим прогноз, то Google предоставит вам самое надёжное предсказание на неделю вперёд.
AntiVirus FREE и другие антивирусные программы
Дискуссия о том, нужны ли антивирусные программы на устройствах под управлением Android, иногда бывает довольно горячей. Я придерживаюсь мнения, что если вы не получаете root-права на устройстве и не устанавливаете взломанные программы из сторонних сомнительных источников, то антивирус вам не нужен. Компания Google бдительно следит за содержимым своего магазина и моментально удаляет из него все потенциально опасные элементы, поэтому всегда активный мониторинг антивируса будет только зря тормозить ваш смартфон или планшет.
Альтернатива. Если возникли всё-таки сомнения в здоровье гаджета, то установите антивирус, просканируйте, а затем удалите его.
Clean Master и другие оптимизаторы системы
Вера в чудеса является самой главной движущей силой для распространения разных «очистителей» и «оптимизаторов». Мол, сотни лучших программистов Google не смогли довести свою систему до ума, а вот этот изобретатель-одиночка взял и сделал! Спешим вас расстроить: большинство подобных приложений либо вообще ничего не делают, либо наносят только вред. Очистить кэш, удалить остатки старых программ можно и встроенными системными инструментами. Очистка же памяти на самом деле только замедляет запуск программ и работу Android вместо обещанного создателями утилит ускорения системы.
Альтернатива. Используйте имеющиеся в Android инструменты для очистки кэша приложений. Забудьте об оптимизации памяти.
Дефолтный браузер
Некоторые производители и разработчики сторонних прошивок снабжают свои творения специальными версиями браузера. Как правило, в них намертво вшиты ссылки на сайты рекламодателей и другой ненужный вам контент. Кроме этого, никто не может поручиться, что такой браузер не сливает вашу информацию налево. Лучше никогда не использовать подобную программу и вообще, если это возможно, удалить её из системы.
Альтернатива. Для Android существуют десятки хороших браузеров, но самым надёжным и быстрым является, несомненно, Google Chrome. Он функционален, обладает поддержкой самых современных веб-технологий, умеет экономить мобильный трафик и обладает простым и понятным интерфейсом.
А какие приложения вы считаете самыми вредными на платформе Android?
Download Version | 5.4.120-2019010910 (500004120) |
Apk Size | 7.74 MB |
App Developer | |
Malware Check | UNKNOWN |
Install on Android | 5.0 and up |
App Package | com.xrom.intl.appcenter.apk |
MD5 | 35e600461d22776a8ec51793e6ea413c |
Rate | 3.57 |
Table of Contents
Download App Store Meizu 5.4.120-2019010910 APK
App Description
App Store Meizu is xrom,intl,appcenter,software,libraries,store,meizu, content rating is Everyone (PEGI-3). This app is rated 3.57 by 7 users who are using this app. To know more about the company/developer, visit website who developed it. com.xrom.intl.appcenter.apk apps can be downloaded and installed on Android 5.0 and higher Android devices. The Latest Version of 5.4.120-2019010910 Available for download. Download the app using your favorite browser and click Install to install the application. Please note that we provide both basic and pure APK files and faster download speeds than APK Mirror. This app APK has been downloaded 94468+ times on store. You can also download com.xrom.intl.appcenter APK and run it with the popular Android Emulators.
App ChangeLog
App Screens
Apk scan results
Permissions
requires following permissions on your android device.
approximate location (network-based)
Allows the app to get your approximate location. This location is derived by location services using network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine approximately where you are.
precise location (GPS and network-based)
Allows the app to get your precise location using the Global Positioning System (GPS) or network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine where you are, and may consume additional battery power.
view network connections
Allows the app to view information about network connections such as which networks exist and are connected.
view Wi-Fi connections
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
pair with Bluetooth devices
Allows the app to view the configuration of the Bluetooth on the phone, and to make and accept connections with paired devices.
change system display settings
Allows the app to change the current configuration, such as the locale or overall font size.
change network connectivity
Allows the app to change the state of network connectivity.
connect and disconnect from Wi-Fi
Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks.
disable your screen lock
Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.
download files without notification
Allows the app to download files through the download manager without any notification being shown to the user.
expand/collapse status bar
Allows the app to expand or collapse the status bar.
find accounts on the device
Allows the app to get the list of accounts known by the phone. This may include any accounts created by applications you have installed.
retrieve running apps
Allows the app to retrieve information about currently and recently running tasks. This may allow the app to discover information about which applications are used on the device.
interact across users
Allows the app to perform actions across different users on the device. Malicious apps may use this to violate the protection between users.
full license to interact across users
Allows all possible interactions across users.
full network access
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
manage users
Allows apps to manage users on the device, including query, creation and deletion.
change your audio settings
Allows the app to modify global audio settings such as volume and which speaker is used for output.
read Usage data
Provides access to device usage history and statistics. Usage data is aggregated into time intervals: days, weeks, months, and years.
read your contacts
Allows the app to read data about your contacts stored on your phone, including the frequency with which you've called, emailed, or communicated in other ways with specific individuals. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.
read the contents of your SD card
Allows the app to read the contents of your SD card.
read phone state
Allows read only access to phone state, including the phone number of the device, current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device.
read your text messages (SMS or MMS)
Allows the app to read SMS messages stored on your phone or SIM card. This allows the app to read all SMS messages, regardless of content or confidentiality.
run at startup
Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the app to slow down the overall phone by always running.
record audio
Allows the app to record audio with the microphone. This permission allows the app to record audio at any time without your confirmation.
set wallpaper
Allows the app to set the system wallpaper.
start any activity
Allows the app to start any activity, regardless of permission protection or exported state.
draw over other apps
Allows the app to draw on top of other applications or parts of the user interface. They may interfere with your use of the interface in any application, or change what you think you are seeing in other applications.
use accounts on the device
Allows the app to request authentication tokens.
control vibration
Allows the app to control the vibrator.
prevent phone from sleeping
Allows the app to prevent the phone from going to sleep.
modify your contacts
Allows the app to modify the data about your contacts stored on your phone, including the frequency with which you've called, emailed, or communicated in other ways with specific contacts. This permission allows apps to delete contact data.
modify or delete the contents of your SD card
Allows the app to write to the SD card.
modify/delete internal media storage contents
Allows the app to modify the contents of the internal media storage.
modify secure system settings
Allows the app to modify the system's secure settings data. Not for use by normal apps.
modify system settings
Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.
set an alarm
Allows the app to set an alarm in an installed alarm clock app. Some alarm clock apps may not implement this feature.
Главные вкладки
AppCenter is a fast software store built on top of libappstore (https://launchpad.net/libappstore)
- Linux
AppCenter is a fast software store built on top of libappstore (https://launchpad.net/libappstore)
Альтернативы приложению AppCenter для Chrome OS
Нашли какие-либо ошибки в информации о AppCenter? Может быть вы знаете альтернативу, которая еще не указана в списке? Вы можете редактировать информацию о AppCenter или предложить новые альтернативы.
Ссылки
Перейти на сайт разработчика или официальный сайт приложения
W Wikipedia
Страница в Википедии
Сервис SuggestUse поможет найти альтернативное программное обеспечение для вашего компьютера, мобильного телефона или планшета.
Основная идея заключается в том, что поиск производится по тем приложениям, которые требуется заменить, в результате получаете список альтернатив на основе рекомендаций зарегистрированных пользователей.
'>
-->This article covers advanced configuration options and scenarios for the ASP.NET Core Module and IIS.
Modify the stack size
Only applies when using the in-process hosting model.
Configure the managed stack size using the stackSize
setting in bytes in the web.config
file. The default size is 1,048,576 bytes (1 MB). The following example changes the stack size to 2 MB (2,097,152 bytes):
Proxy configuration uses HTTP protocol and a pairing token
Only applies to out-of-process hosting.
The proxy created between the ASP.NET Core Module and Kestrel uses the HTTP protocol. There's no risk of eavesdropping the traffic between the module and Kestrel from a location off of the server.
A pairing token is used to guarantee that the requests received by Kestrel were proxied by IIS and didn't come from some other source. Rebel galaxy 1 0 8b download free. The pairing token is created and set into an environment variable (ASPNETCORE_TOKEN
) by the module. The pairing token is also set into a header (MS-ASPNETCORE-TOKEN
) on every proxied request. IIS Middleware checks each request it receives to confirm that the pairing token header value matches the environment variable value. If the token values are mismatched, the request is logged and rejected. The pairing token environment variable and the traffic between the module and Kestrel aren't accessible from a location off of the server. Without knowing the pairing token value, an attacker can't submit requests that bypass the check in the IIS Middleware.
ASP.NET Core Module with an IIS Shared Configuration
The ASP.NET Core Module installer runs with the privileges of the TrustedInstaller
account. Because the local system account doesn't have modify permission for the share path used by the IIS Shared Configuration, the installer throws an access denied error when attempting to configure the module settings in the applicationHost.config
file on the share.
When using an IIS Shared Configuration on the same machine as the IIS installation, run the ASP.NET Core Hosting Bundle installer with the OPT_NO_SHARED_CONFIG_CHECK
parameter set to 1
:
When the path to the shared configuration isn't on the same machine as the IIS installation, follow these steps:
- Disable the IIS Shared Configuration.
- Run the installer.
- Export the updated
applicationHost.config
file to the file share. - Re-enable the IIS Shared Configuration.
Data protection
The ASP.NET Core Data Protection stack is used by several ASP.NET Core middlewares, including middleware used in authentication. Even if Data Protection APIs aren't called by user code, data protection should be configured with a deployment script or in user code to create a persistent cryptographic key store. If data protection isn't configured, the keys are held in memory and discarded when the app restarts.
If the Data Protection key ring is stored in memory when the app restarts:
- All cookie-based authentication tokens are invalidated.
- Users are required to sign in again on their next request.
- Any data protected with the key ring can no longer be decrypted. This may include CSRF tokens and ASP.NET Core MVC TempData cookies.
To configure data protection under IIS to persist the key ring, use one of the following approaches:
Create Data Protection Registry keys
Data Protection keys used by ASP.NET Core apps are stored in the registry external to the apps. To persist the keys for a given app, create Registry keys for the app pool.
For standalone, non-webfarm IIS installations, the Data Protection Provision-AutoGenKeys.ps1 PowerShell script can be used for each app pool used with an ASP.NET Core app. This script creates a Registry key in the HKLM registry that's accessible only to the worker process account of the app's app pool. Keys are encrypted at rest using DPAPI with a machine-wide key.
In web farm scenarios, an app can be configured to use a UNC path to store its Data Protection key ring. By default, the keys aren't encrypted. Ensure that the file permissions for the network share are limited to the Windows account that the app runs under. An X509 certificate can be used to protect keys at rest. Consider a mechanism to allow users to upload certificates. Place certificates into the user's trusted certificate store and ensure they're available on all machines where the user's app runs. For more information, see Configure ASP.NET Core Data Protection.
Configure the IIS Application Pool to load the user profile
This setting is in the Process Model section under the Advanced Settings for the app pool. Set Load User Profile to
True
. When set toTrue
, keys are stored in the user profile directory and protected using DPAPI with a key specific to the user account. Keys are persisted to the%LOCALAPPDATA%/ASP.NET/DataProtection-Keys
folder.The app pool's
setProfileEnvironment
attribute must also be enabled. The default value ofsetProfileEnvironment
istrue
. In some scenarios (for example, Windows OS),setProfileEnvironment
is set tofalse
. If keys aren't stored in the user profile directory as expected:- Navigate to the
%windir%/system32/inetsrv/config
folder. - Open the
applicationHost.config
file. - Locate the
element.
- Confirm that the
setProfileEnvironment
attribute isn't present, which defaults the value totrue
, or explicitly set the attribute's value totrue
.
- Navigate to the
Use the file system as a key ring store
Adjust the app code to use the file system as a key ring store. Use an X509 certificate to protect the key ring and ensure the certificate is a trusted certificate. If the certificate is self-signed, place the certificate in the Trusted Root store.
When using IIS in a web farm:
- Use a file share that all machines can access.
- Deploy an X509 certificate to each machine. Configure Data Protection in code.
Set a machine-wide policy for Data Protection
The Data Protection system has limited support for setting a default machine-wide policy for all apps that consume the Data Protection APIs. For more information, see ASP.NET Core Data Protection.
IIS configuration
Windows Server operating systems
Enable the Web Server (IIS) server role and establish role services.
Use the Add Roles and Features wizard from the Manage menu or the link in Server Manager. On the Server Roles step, check the box for Web Server (IIS).
After the Features step, the Role services step loads for Web Server (IIS). Select the IIS role services desired or accept the default role services provided.
Windows Authentication (Optional)
To enable Windows Authentication, expand the following nodes: Web Server > Security. Select the Windows Authentication feature. For more information, see Windows Authenticationand Configure Windows authentication.
WebSockets (Optional)
WebSockets is supported with ASP.NET Core 1.1 or later. To enable WebSockets, expand the following nodes: Web Server > Application Development. Select the WebSocket Protocol feature. For more information, see WebSockets.Proceed through the Confirmation step to install the web server role and services. A server/IIS restart isn't required after installing the Web Server (IIS) role.
Windows desktop operating systems
Enable the IIS Management Console and World Wide Web Services.
Navigate to Control Panel > Programs > Programs and Features > Turn Windows features on or off (left side of the screen).
Open the Internet Information Services node. Open the Web Management Tools node.
Check the box for IIS Management Console.
Check the box for World Wide Web Services.
Accept the default features for World Wide Web Services or customize the IIS features.
Windows Authentication (Optional)
To enable Windows Authentication, expand the following nodes: World Wide Web Services > Security. Select the Windows Authentication feature. For more information, see Windows Authenticationand Configure Windows authentication.
WebSockets (Optional)
WebSockets is supported with ASP.NET Core 1.1 or later. To enable WebSockets, expand the following nodes: World Wide Web Services > Application Development Features. Select the WebSocket Protocol feature. For more information, see WebSockets.If the IIS installation requires a restart, restart the system.
Virtual Directories
IIS Virtual Directories aren't supported with ASP.NET Core apps. An app can be hosted as a sub-application.
Sub-applications
An ASP.NET Core app can be hosted as an IIS sub-application (sub-app). The sub-app's path becomes part of the root app's URL.
Static asset links within the sub-app should use tilde-slash (~/
) notation. Tilde-slash notation triggers a Tag Helper to prepend the sub-app's pathbase to the rendered relative link. For a sub-app at /subapp_path
, an image linked with src='~/image.png'
is rendered as src='/subapp_path/image.png'
. The root app's Static File Middleware doesn't process the static file request. The request is processed by the sub-app's Static File Middleware.
If a static asset's src
attribute is set to an absolute path (for example, src='/image.png'
), the link is rendered without the sub-app's pathbase. The root app's Static File Middleware attempts to serve the asset from the root app's web root, which results in a 404 - Not Found response unless the static asset is available from the root app.
- Linux
AppCenter is a fast software store built on top of libappstore (https://launchpad.net/libappstore)
Альтернативы приложению AppCenter для Chrome OS
Нашли какие-либо ошибки в информации о AppCenter? Может быть вы знаете альтернативу, которая еще не указана в списке? Вы можете редактировать информацию о AppCenter или предложить новые альтернативы.
Ссылки
Перейти на сайт разработчика или официальный сайт приложения
W Wikipedia
Страница в Википедии
Сервис SuggestUse поможет найти альтернативное программное обеспечение для вашего компьютера, мобильного телефона или планшета.
Основная идея заключается в том, что поиск производится по тем приложениям, которые требуется заменить, в результате получаете список альтернатив на основе рекомендаций зарегистрированных пользователей.
'>
-->This article covers advanced configuration options and scenarios for the ASP.NET Core Module and IIS.
Modify the stack size
Only applies when using the in-process hosting model.
Configure the managed stack size using the stackSize
setting in bytes in the web.config
file. The default size is 1,048,576 bytes (1 MB). The following example changes the stack size to 2 MB (2,097,152 bytes):
Proxy configuration uses HTTP protocol and a pairing token
Only applies to out-of-process hosting.
The proxy created between the ASP.NET Core Module and Kestrel uses the HTTP protocol. There's no risk of eavesdropping the traffic between the module and Kestrel from a location off of the server.
A pairing token is used to guarantee that the requests received by Kestrel were proxied by IIS and didn't come from some other source. Rebel galaxy 1 0 8b download free. The pairing token is created and set into an environment variable (ASPNETCORE_TOKEN
) by the module. The pairing token is also set into a header (MS-ASPNETCORE-TOKEN
) on every proxied request. IIS Middleware checks each request it receives to confirm that the pairing token header value matches the environment variable value. If the token values are mismatched, the request is logged and rejected. The pairing token environment variable and the traffic between the module and Kestrel aren't accessible from a location off of the server. Without knowing the pairing token value, an attacker can't submit requests that bypass the check in the IIS Middleware.
ASP.NET Core Module with an IIS Shared Configuration
The ASP.NET Core Module installer runs with the privileges of the TrustedInstaller
account. Because the local system account doesn't have modify permission for the share path used by the IIS Shared Configuration, the installer throws an access denied error when attempting to configure the module settings in the applicationHost.config
file on the share.
When using an IIS Shared Configuration on the same machine as the IIS installation, run the ASP.NET Core Hosting Bundle installer with the OPT_NO_SHARED_CONFIG_CHECK
parameter set to 1
:
When the path to the shared configuration isn't on the same machine as the IIS installation, follow these steps:
- Disable the IIS Shared Configuration.
- Run the installer.
- Export the updated
applicationHost.config
file to the file share. - Re-enable the IIS Shared Configuration.
Data protection
The ASP.NET Core Data Protection stack is used by several ASP.NET Core middlewares, including middleware used in authentication. Even if Data Protection APIs aren't called by user code, data protection should be configured with a deployment script or in user code to create a persistent cryptographic key store. If data protection isn't configured, the keys are held in memory and discarded when the app restarts.
If the Data Protection key ring is stored in memory when the app restarts:
- All cookie-based authentication tokens are invalidated.
- Users are required to sign in again on their next request.
- Any data protected with the key ring can no longer be decrypted. This may include CSRF tokens and ASP.NET Core MVC TempData cookies.
To configure data protection under IIS to persist the key ring, use one of the following approaches:
Create Data Protection Registry keys
Data Protection keys used by ASP.NET Core apps are stored in the registry external to the apps. To persist the keys for a given app, create Registry keys for the app pool.
For standalone, non-webfarm IIS installations, the Data Protection Provision-AutoGenKeys.ps1 PowerShell script can be used for each app pool used with an ASP.NET Core app. This script creates a Registry key in the HKLM registry that's accessible only to the worker process account of the app's app pool. Keys are encrypted at rest using DPAPI with a machine-wide key.
In web farm scenarios, an app can be configured to use a UNC path to store its Data Protection key ring. By default, the keys aren't encrypted. Ensure that the file permissions for the network share are limited to the Windows account that the app runs under. An X509 certificate can be used to protect keys at rest. Consider a mechanism to allow users to upload certificates. Place certificates into the user's trusted certificate store and ensure they're available on all machines where the user's app runs. For more information, see Configure ASP.NET Core Data Protection.
Configure the IIS Application Pool to load the user profile
This setting is in the Process Model section under the Advanced Settings for the app pool. Set Load User Profile to
True
. When set toTrue
, keys are stored in the user profile directory and protected using DPAPI with a key specific to the user account. Keys are persisted to the%LOCALAPPDATA%/ASP.NET/DataProtection-Keys
folder.The app pool's
setProfileEnvironment
attribute must also be enabled. The default value ofsetProfileEnvironment
istrue
. In some scenarios (for example, Windows OS),setProfileEnvironment
is set tofalse
. If keys aren't stored in the user profile directory as expected:- Navigate to the
%windir%/system32/inetsrv/config
folder. - Open the
applicationHost.config
file. - Locate the
element.
- Confirm that the
setProfileEnvironment
attribute isn't present, which defaults the value totrue
, or explicitly set the attribute's value totrue
.
- Navigate to the
Use the file system as a key ring store
Adjust the app code to use the file system as a key ring store. Use an X509 certificate to protect the key ring and ensure the certificate is a trusted certificate. If the certificate is self-signed, place the certificate in the Trusted Root store.
When using IIS in a web farm:
- Use a file share that all machines can access.
- Deploy an X509 certificate to each machine. Configure Data Protection in code.
Set a machine-wide policy for Data Protection
The Data Protection system has limited support for setting a default machine-wide policy for all apps that consume the Data Protection APIs. For more information, see ASP.NET Core Data Protection.
IIS configuration
Windows Server operating systems
Enable the Web Server (IIS) server role and establish role services.
Use the Add Roles and Features wizard from the Manage menu or the link in Server Manager. On the Server Roles step, check the box for Web Server (IIS).
After the Features step, the Role services step loads for Web Server (IIS). Select the IIS role services desired or accept the default role services provided.
Windows Authentication (Optional)
To enable Windows Authentication, expand the following nodes: Web Server > Security. Select the Windows Authentication feature. For more information, see Windows Authenticationand Configure Windows authentication.
WebSockets (Optional)
WebSockets is supported with ASP.NET Core 1.1 or later. To enable WebSockets, expand the following nodes: Web Server > Application Development. Select the WebSocket Protocol feature. For more information, see WebSockets.Proceed through the Confirmation step to install the web server role and services. A server/IIS restart isn't required after installing the Web Server (IIS) role.
Windows desktop operating systems
Enable the IIS Management Console and World Wide Web Services.
Navigate to Control Panel > Programs > Programs and Features > Turn Windows features on or off (left side of the screen).
Open the Internet Information Services node. Open the Web Management Tools node.
Check the box for IIS Management Console.
Check the box for World Wide Web Services.
Accept the default features for World Wide Web Services or customize the IIS features.
Windows Authentication (Optional)
To enable Windows Authentication, expand the following nodes: World Wide Web Services > Security. Select the Windows Authentication feature. For more information, see Windows Authenticationand Configure Windows authentication.
WebSockets (Optional)
WebSockets is supported with ASP.NET Core 1.1 or later. To enable WebSockets, expand the following nodes: World Wide Web Services > Application Development Features. Select the WebSocket Protocol feature. For more information, see WebSockets.If the IIS installation requires a restart, restart the system.
Virtual Directories
IIS Virtual Directories aren't supported with ASP.NET Core apps. An app can be hosted as a sub-application.
Sub-applications
An ASP.NET Core app can be hosted as an IIS sub-application (sub-app). The sub-app's path becomes part of the root app's URL.
Static asset links within the sub-app should use tilde-slash (~/
) notation. Tilde-slash notation triggers a Tag Helper to prepend the sub-app's pathbase to the rendered relative link. For a sub-app at /subapp_path
, an image linked with src='~/image.png'
is rendered as src='/subapp_path/image.png'
. The root app's Static File Middleware doesn't process the static file request. The request is processed by the sub-app's Static File Middleware.
If a static asset's src
attribute is set to an absolute path (for example, src='/image.png'
), the link is rendered without the sub-app's pathbase. The root app's Static File Middleware attempts to serve the asset from the root app's web root, which results in a 404 - Not Found response unless the static asset is available from the root app.
To host an ASP.NET Core app as a sub-app under another ASP.NET Core app:
Establish an app pool for the sub-app. Set the .NET CLR Version to No Managed Code because the Core Common Language Runtime (CoreCLR) for .NET Core is booted to host the app in the worker process, not the desktop CLR (.NET CLR).
Add the root site in IIS Manager with the sub-app in a folder under the root site.
Right-click the sub-app folder in IIS Manager and select Convert to Application.
In the Add Application dialog, use the Select button for the Application Pool to assign the app pool that you created for the sub-app. Select OK.
The assignment of a separate app pool to the sub-app is a requirement when using the in-process hosting model.
For more information on the in-process hosting model and configuring the ASP.NET Core Module, see ASP.NET Core Module.
Application Pools
App pool isolation is determined by the hosting model:
- In-process hosting: Apps are required to run in separate app pools.
- Out-of-process hosting: We recommend isolating the apps from each other by running each app in its own app pool.
The IIS Add Website dialog defaults to a single app pool per app. When a Site name is provided, the text is automatically transferred to the Application pool textbox. A new app pool is created using the site name when the site is added.
Application Pool Identity
An app pool identity account allows an app to run under a unique account without having to create and manage domains or local accounts. On IIS 8.0 or later, the IIS Admin Worker Process (WAS) creates a virtual account with the name of the new app pool and runs the app pool's worker processes under this account by default. In the IIS Management Console under Advanced Settings for the app pool, ensure that the Identity is set to use ApplicationPoolIdentity
:
The IIS management process creates a secure identifier with the name of the app pool in the Windows Security System. Resources can be secured using this identity. However, this identity isn't a real user account and doesn't show up in the Windows User Management Console.
If the IIS worker process requires elevated access to the app, modify the Access Control List (ACL) for the directory containing the app:
Open Windows Explorer and navigate to the directory.
Right-click on the directory and select Properties.
Under the Security tab, select the Edit button and then the Add button.
Select the Locations button and make sure the system is selected.
Enter
IIS AppPool{APP POOL NAME}
format, where the placeholder{APP POOL NAME}
is the app pool name, in Enter the object names to select area. Select the Check Names button. For the DefaultAppPool check the names usingIIS AppPoolDefaultAppPool
. When the Check Names button is selected, a value ofDefaultAppPool
is indicated in the object names area. It isn't possible to enter the app pool name directly into the object names area. Use theIIS AppPool{APP POOL NAME}
format, where the placeholder{APP POOL NAME}
is the app pool name, when checking for the object name.Select OK.
Read & execute permissions should be granted by default. Provide additional permissions as needed.
Access can also be granted at a command prompt using the ICACLS tool. Using the DefaultAppPool as an example, the following command is used:
For more information, see the icacls topic.
HTTP/2 support
HTTP/2 is supported with ASP.NET Core in the following IIS deployment scenarios:
- In-process
- Windows Server 2016/Windows 10 or later; IIS 10 or later
- TLS 1.2 or later connection
- Out-of-process
- Windows Server 2016/Windows 10 or later; IIS 10 or later
- Public-facing edge server connections use HTTP/2, but the reverse proxy connection to the Kestrel server uses HTTP/1.1.
- TLS 1.2 or later connection
For an in-process deployment when an HTTP/2 connection is established, HttpRequest.Protocol
reports HTTP/2
. For an out-of-process deployment when an HTTP/2 connection is established, HttpRequest.Protocol
reports HTTP/1.1
.
For more information on the in-process and out-of-process hosting models, see ASP.NET Core Module.
HTTP/2 is enabled by default. Connections fall back to HTTP/1.1 if an HTTP/2 connection isn't established. For more information on HTTP/2 configuration with IIS deployments, see HTTP/2 on IIS.
CORS preflight requests
This section only applies to ASP.NET Core apps that target the .NET Framework.
For an ASP.NET Core app that targets the .NET Framework, OPTIONS requests aren't passed to the app by default in IIS. To learn how to configure the app's IIS handlers in web.config
to pass OPTIONS requests, see Enable cross-origin requests in ASP.NET Web API 2: How CORS Works.
Application Initialization Module and Idle Timeout
When hosted in IIS by the ASP.NET Core Module version 2:
- Application Initialization Module: App's hosted in-process or out-of-process can be configured to start automatically on a worker process restart or server restart.
- Idle Timeout: App's hosted in-process can be configured not to time out during periods of inactivity.
Application Initialization Module
Networker Advanced Network Information App 3 2 10
Applies to apps hosted in-process and out-of-process.
IIS Application Initialization is an IIS feature that sends an HTTP request to the app when the app pool starts or is recycled. The request triggers the app to start. By default, IIS issues a request to the app's root URL (/
) to initialize the app (see the additional resources for more details on configuration).
Confirm that the IIS Application Initialization role feature in enabled:
On Windows 7 or later desktop systems when using IIS locally:
- Navigate to Control Panel > Programs > Programs and Features > Turn Windows features on or off (left side of the screen).
- Open Internet Information Services > World Wide Web Services > Application Development Features.
- Select the checkbox for Application Initialization.
On Windows Server 2008 R2 or later:
- Open the Add Roles and Features Wizard.
- In the Select role services panel, open the Application Development node.
- Select the checkbox for Application Initialization.
Use either of the following approaches to enable the Application Initialization Module for the site:
Networker Advanced Network Information App 3 2 1 4
Using IIS Manager:
- Select Application Pools in the Connections panel.
- Right-click the app's app pool in the list and select Advanced Settings.
- The default Start Mode is
OnDemand
. Set the Start Mode toAlwaysRunning
. Select OK. - Open the Sites node in the Connections panel.
- Right-click the app and select Manage Website > Advanced Settings.
- The default Preload Enabled setting is
False
. Set Preload Enabled toTrue
. Select OK.
Using
web.config
, add theelement with
doAppInitAfterRestart
set totrue
to theelements in the app's
web.config
file:
Idle Timeout
Only applies to apps hosted in-process.
To prevent the app from idling, set the app pool's idle timeout using IIS Manager:
- Select Application Pools in the Connections panel.
- Right-click the app's app pool in the list and select Advanced Settings.
- The default Idle Time-out (minutes) is
20
minutes. Set the Idle Time-out (minutes) to0
(zero). Select OK. - Recycle the worker process.
To prevent apps hosted out-of-process from timing out, use either of the following approaches:
- Ping the app from an external service in order to keep it running.
- If the app only hosts background services, avoid IIS hosting and use a Windows Service to host the ASP.NET Core app.
Application Initialization Module and Idle Timeout additional resources
- Application Initialization
.
- Process Model Settings for an Application Pool
.
Module, schema, and configuration file locations
Networker Advanced Network Information App 3 2 12
Module
IIS (x86/amd64):
%windir%System32inetsrvaspnetcore.dll
%windir%SysWOW64inetsrvaspnetcore.dll
%ProgramFiles%IISAsp.Net Core ModuleV2aspnetcorev2.dll
%ProgramFiles(x86)%IISAsp.Net Core ModuleV2aspnetcorev2.dll
IIS Express (x86/amd64):
%ProgramFiles%IIS Expressaspnetcore.dll
%ProgramFiles(x86)%IIS Expressaspnetcore.dll
%ProgramFiles%IIS ExpressAsp.Net Core ModuleV2aspnetcorev2.dll
%ProgramFiles(x86)%IIS ExpressAsp.Net Core ModuleV2aspnetcorev2.dll
Networker Advanced Network Information App 3 2 1 Method
Schema
IIS
%windir%System32inetsrvconfigschemaaspnetcore_schema.xml
%windir%System32inetsrvconfigschemaaspnetcore_schema_v2.xml
IIS Express
%ProgramFiles%IIS Expressconfigschemaaspnetcore_schema.xml
%ProgramFiles%IIS Expressconfigschemaaspnetcore_schema_v2.xml
Configuration
IIS
%windir%System32inetsrvconfigapplicationHost.config
Networker Advanced Network Information App 3 2 1 3
IIS Express
Visual Studio:
{APPLICATION ROOT}.vsconfigapplicationHost.config
iisexpress.exe CLI:
%USERPROFILE%DocumentsIISExpressconfigapplicationhost.config
The files can be found by searching for aspnetcore
in the applicationHost.config
file.