WindowsIdentity.RunImpersonated Method (SafeAccessTokenHandle, Action)
.NET Framework (current version)
Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in WindowsImpersonationContext, you can use RunImpersonated and provide your function directly as a parameter.
Assembly: mscorlib (in mscorlib.dll)
public static void RunImpersonated( SafeAccessTokenHandle safeAccessTokenHandle, Action action )
Parameters
- safeAccessTokenHandle
-
Type:
Microsoft.Win32.SafeHandles.SafeAccessTokenHandle
The SafeAccessTokenHandle of the impersonated Windows identity.
- action
-
Type:
System.Action
The System.Action to run.
The following example demonstrates the use of the WindowsIdentity class to impersonate a user.
Warning |
|---|
This sample asks the user to enter a password on the console screen. The password will be visible on the screen, because the console window does not support masked input natively. |
// The following example demonstrates the use of the WindowsIdentity class to impersonate a user. // IMPORTANT NOTE: // This sample asks the user to enter a password on the console screen. // The password will be visible on the screen, because the console window // does not support masked input natively. using System; using System.Runtime.InteropServices; using System.Security; using System.Security.Principal; using Microsoft.Win32.SafeHandles; public class ImpersonationDemo { [DllImport("advapi32.dll", SetLastError = true, CharSet = CharSet.Unicode)] public static extern bool LogonUser(String lpszUsername, String lpszDomain, String lpszPassword, int dwLogonType, int dwLogonProvider, out SafeAccessTokenHandle phToken); public static void Main() { // Get the user token for the specified user, domain, and password using the // unmanaged LogonUser method. // The local machine name can be used for the domain name to impersonate a user on this machine. Console.Write("Enter the name of the domain on which to log on: "); string domainName = Console.ReadLine(); Console.Write("Enter the login of a user on {0} that you wish to impersonate: ", domainName); string userName = Console.ReadLine(); Console.Write("Enter the password for {0}: ", userName); const int LOGON32_PROVIDER_DEFAULT = 0; //This parameter causes LogonUser to create a primary token. const int LOGON32_LOGON_INTERACTIVE = 2; // Call LogonUser to obtain a handle to an access token. SafeAccessTokenHandle safeAccessTokenHandle; bool returnValue = LogonUser(userName, domainName, Console.ReadLine(), LOGON32_LOGON_INTERACTIVE, LOGON32_PROVIDER_DEFAULT, out safeAccessTokenHandle); if (false == returnValue) { int ret = Marshal.GetLastWin32Error(); Console.WriteLine("LogonUser failed with error code : {0}", ret); throw new System.ComponentModel.Win32Exception(ret); } Console.WriteLine("Did LogonUser Succeed? " + (returnValue ? "Yes" : "No")); // Check the identity. Console.WriteLine("Before impersonation: " + WindowsIdentity.GetCurrent().Name); // Note: if you want to run as unimpersonated, pass // 'SafeAccessTokenHandle.InvalidHandle' instead of variable 'safeAccessTokenHandle' WindowsIdentity.RunImpersonated( safeAccessTokenHandle, // User action () => { // Check the identity. Console.WriteLine("During impersonation: " + WindowsIdentity.GetCurrent().Name); } ); // Check the identity again. Console.WriteLine("After impersonation: " + WindowsIdentity.GetCurrent().Name); } }
.NET Framework
Available since 4.6
Available since 4.6
Show:
