1

I'm working on adding a document upload function to an application I've written. I want the user to be able to upload, open, and delete a document on a network drive that they cannot access normally. With this in mind, I stumbled upon Impersonation, where the user can impersonate a user account that has full rights to the drive, then dispose of that after the code has been executed.

I've never used impersonation before, so during my research I found this thread: Impersonate a Windows or Active Directory user from a different, untrusted domain

I created and copied the class that user Max Vernon had posted as follows:

Option Explicit On
Option Infer Off

Imports System
Imports System.Runtime.InteropServices '   DLL Import
Imports System.Security.Principal '  WindowsImpersonationContext
Imports System.ComponentModel

Public Class Impersonation

    'Group Type Enum
    Enum SECURITY_IMPERSONATION_LEVEL As Int32
        SecurityAnonymous = 0
        SecurityIdentification = 1
        SecurityImpersonation = 2
        SecurityDelegation = 3
    End Enum

    Public Enum LogonType As Integer

        'This logon type is intended for users who will be interactively using the computer, such as a user being logged on
        'by a terminal server, remote shell, or similar process.
        'This logon type has the additional expense of caching logon information for disconnected operations,
        'therefore, it is inappropriate for some client/server applications, such as a mail server.
        LOGON32_LOGON_INTERACTIVE = 2

        'This logon type is intended for high performance servers to authenticate plaintext passwords.
        'The LogonUser function does not cache credentials for this logon type.
        LOGON32_LOGON_NETWORK = 3

        'This logon type is intended for batch servers, where processes may be executing on behalf of a user without
        'their direct intervention. This type is also for higher performance servers that process many plaintext
        'authentication attempts at a time, such as mail or Web servers.
        'The LogonUser function does not cache credentials for this logon type.
        LOGON32_LOGON_BATCH = 4

        'Indicates a service-type logon. The account provided must have the service privilege enabled.
        LOGON32_LOGON_SERVICE = 5

        'This logon type is for GINA DLLs that log on users who will be interactively using the computer.
        'This logon type can generate a unique audit record that shows when the workstation was unlocked.
        LOGON32_LOGON_UNLOCK = 7

        'This logon type preserves the name and password in the authentication package, which allows the server to make
        'connections to other network servers while impersonating the client. A server can accept plaintext credentials
        'from a client, call LogonUser, verify that the user can access the system across the network, and still
        'communicate with other servers.
        'NOTE: Windows NT:  This value is not supported.
        LOGON32_LOGON_NETWORK_CLEARTEXT = 8

        'This logon type allows the caller to clone its current token and specify new credentials for outbound connections.
        'The new logon session has the same local identifier but uses different credentials for other network connections.
        'NOTE: This logon type is supported only by the LOGON32_PROVIDER_WINNT50 logon provider.
        'NOTE: Windows NT:  This value is not supported.
        LOGON32_LOGON_NEW_CREDENTIALS = 9

    End Enum

    Public Enum LogonProvider As Integer

        'Use the standard logon provider for the system.
        'The default security provider is negotiate, unless you pass NULL for the domain name and the user name
        'is not in UPN format. In this case, the default provider is NTLM.
        'NOTE: Windows 2000/NT:   The default security provider is NTLM.
        LOGON32_PROVIDER_DEFAULT = 0
        LOGON32_PROVIDER_WINNT35 = 1
        LOGON32_PROVIDER_WINNT40 = 2
        LOGON32_PROVIDER_WINNT50 = 3

    End Enum

    'Obtains user token.
    Declare Auto Function LogonUser Lib "advapi32.dll" (ByVal lpszUsername As String, ByVal lpszDomain As String, ByVal lpszPassword As String, ByVal dwLogonType As LogonType, ByVal dwLogonProvider As LogonProvider, ByRef phToken As IntPtr) As Integer


    'Closes open handles returned by LogonUser.
    Declare Function CloseHandle Lib "kernel32.dll" (ByVal handle As IntPtr) As Boolean

    'Creates duplicate token handle.
    Declare Auto Function DuplicateToken Lib "advapi32.dll" (ExistingTokenHandle As IntPtr, SECURITY_IMPERSONATION_LEVEL As Int16, ByRef DuplicateTokenHandle As IntPtr) As Boolean

    'WindowsImpersonationContext newUser.
    Private newUser As WindowsImpersonationContext

    'Attempts to impersonate a user.  If successful, returns 
    'a WindowsImpersonationContext of the new user's identity.
    ' 
    'Username that you want to impersonate.
    'Logon domain.
    'User's password to logon with.
    Public Sub Impersonator(ByVal sDomain As String, ByVal sUsername As String, ByVal sPassword As String)

        'Initialize tokens
        Dim pExistingTokenHandle As New IntPtr(0)
        Dim pDuplicateTokenHandle As New IntPtr(0)

        If sDomain = "" Then
            sDomain = System.Environment.MachineName
        End If

        Try

            Const LOGON32_PROVIDER_DEFAULT As Int32 = 0
            Const LOGON32_LOGON_NEW_CREDENTIALS = 9

            Dim bImpersonated As Boolean = LogonUser(sUsername, sDomain, sPassword, LOGON32_LOGON_NEW_CREDENTIALS, LOGON32_PROVIDER_DEFAULT, pExistingTokenHandle)

            If bImpersonated = False Then
                Dim nErrorCode As Int32 = Marshal.GetLastWin32Error()
                Throw New ApplicationException("LogonUser() failed with error code: " & nErrorCode.ToString)
            End If

            Dim bRetVal As Boolean = DuplicateToken(pExistingTokenHandle, SECURITY_IMPERSONATION_LEVEL.SecurityImpersonation, pDuplicateTokenHandle)
            If bRetVal = False Then
                Dim nErrorCode As Int32 = Marshal.GetLastWin32Error
                CloseHandle(pExistingTokenHandle)
                Throw New ApplicationException("DuplicateToken() failed with error code: " & nErrorCode)
            Else
                Dim newId As New WindowsIdentity(pDuplicateTokenHandle)
                Dim impersonatedUser As WindowsImpersonationContext = newId.Impersonate
                newUser = impersonatedUser
            End If

        Catch ex As Exception
            MessageBox.Show("An error has occurred. Please contact Technical Support. " & vbCrLf & ex.Message, "Application Title", MessageBoxButtons.OK, MessageBoxIcon.Error)
        Finally
            If pExistingTokenHandle <> IntPtr.Zero Then
                CloseHandle(pExistingTokenHandle)
            End If
            If pDuplicateTokenHandle <> IntPtr.Zero Then
                CloseHandle(pDuplicateTokenHandle)
            End If
        End Try
    End Sub

    Public Sub Undo()
        newUser.Undo()
    End Sub
End Class

The impersonation works great for "uploading" (actually just copying a file over from the users local files to the network drive, creating a specific file path if it doesn't exist) but doesn't seem to work when trying to open the file back up, or delete said file.

I get an access denied error like this:

Error Message When Trying to Open File

Error Message When Trying to Open File

The Open File Click Event and Class Call Looks Like This:

 Private Sub btnOpenDoc_Click(sender As Object, e As EventArgs) Handles btnOpenDoc.Click
        Dim Impersonator As New Impersonation
        Dim sUser As String = "UserNameGoesHere"
        Dim sPass As String = "PasswordGoesHere"
        Dim sDomain As String = "DomainGoesHere"

        Try
            If sActionID <> "" And iDocument = 1 Then
                'Starts impersonation
                Impersonator.Impersonator(sDomain, sUser, sPass)

                Process.Start(RetrieveFilePath())

                'Ends Impersonation
                Impersonator.Undo()
            End If

        Catch ex As Exception
            MessageBox.Show("An error has occurred. Please contact Technical Support. " & vbCrLf & ex.Message, "Application Title", MessageBoxButtons.OK, MessageBoxIcon.Error)
            modGlobal.WriteToErrorLog(ex.Message, "frmActionEntry", modGlobal.GetExceptionInfo(ex), "frmActionEntry->btnOpenDoc_Click", currentUser.getEmployeeName())
        End Try
    End Sub

Here's Document Delete Function:

    Private Function DeleteFile() As Boolean
        Dim Impersonator As New Impersonation
        Dim sUser As String = "UsernameGoesHere"
        Dim sPass As String = "PasswordGoesHere"
        Dim sDomain As String = "DomainGoesHere"

        Try
            'Starts impersonation
            Impersonator.Impersonator(sDomain, sUser, sPass)

            File.Delete(RetrieveFilePath())
            Return True

            'Ends Impersonation
            Impersonator.Undo()
        Catch ex As Exception
            MessageBox.Show("An error has occurred. Please contact Technical Support. " & vbCrLf & ex.Message, "Application Title", MessageBoxButtons.OK, MessageBoxIcon.Error)
            modGlobal.WriteToErrorLog(ex.Message, "frmActionEntry", modGlobal.GetExceptionInfo(ex), "frmActionEntry->DeleteFile", currentUser.getEmployeeName())
            Return False
        End Try
    End Function

It's used in basically the same way in the FileSave function. Like I said I'm new to impersonation, and feel like I've hit a wall, having researched and tried various things all morning. Any advice is much appreciated!

-Levi

Levi
  • 21
  • 1
  • 9
  • Just to add, after doing some more research and thinking on this, I believe my problem is that the admin account I've made doesn't have permission to open up the files on the local users computer. Still don't know how to fix it, just some additional thoughts. – Levi Feb 21 '19 at 14:21

2 Answers2

1

So after much research and trial and error I have an answer to this.

The short answer:

There is not a clean, elegant way to use impersonation to open a file on a network drive because you either butt heads with Windows Security or run into problems with Windows Shell. I decided to go another route.

The long answer:

I believe I was correct in that the Access was Denied error was due to trying to open a file as the impersonated user on the local user's computer. To get around this I decided to try and use ProcessStartInfo() to pass in the correct credentials (while also using impersonation to access the drive) like this:

'Opens the document associated with this action
    Private Sub btnOpenDoc_Click(sender As Object, e As EventArgs) Handles btnOpenDoc.Click
        'Initializes an impersonation object
        Dim Impersonator As New Impersonation
        'Strings with login credentials
        Dim sUser As String = "UsernameGoesHere"
        Dim sPass As String = "PasswordGoesHere"
        Dim sDomain As String = "DomainGoesHere"
        'Used to load file path in from RetrieveFilePath()
        Dim sPath As String = ""

        Try
            If sActionID <> "" And iDocument = 1 Then
                'Starts impersonation
                Impersonator.Impersonator(sDomain, sUser, sPass)

                'Initializes a ProcessStartInfo Object to use with impersonation
                'as Process.Start class always inherits the security context of 
                'the parent process i.e. the local user
                Dim startInfo As New ProcessStartInfo()

                'Creates a secure string as the startInfo.Password parameter only accepts SecureStrings
                Dim securePass As New Security.SecureString()

                'You can't put a full string into a SecureString, so appending char by char
                For Each c As Char In sPass
                    securePass.AppendChar(c)
                Next

                'Grab the file path
                sPath = RetrieveFilePath()

                'Load in the parameters for startInfo
                startInfo.FileName = sPath
                startInfo.UserName = sUser
                startInfo.Password = securePass
                startInfo.Domain = sDomain
                startInfo.UseShellExecute = False
                startInfo.WorkingDirectory = "\\Directory\Goes Here"

                If File.Exists(sPath) Then
                    'Execute the process using startInfo
                    Process.Start(startInfo)
                Else
                    MsgBox("File Not Found!")
                End If

                'Dispose of securePass
                securePass.Dispose()

                'Ends Impersonation
                Impersonator.Undo()
            End If

        Catch ex As Exception
            MessageBox.Show("An error has occurred. Please contact Technical Support. " & vbCrLf & ex.Message, "Application Title", MessageBoxButtons.OK, MessageBoxIcon.Error)
            modGlobal.WriteToErrorLog(ex.Message, "frmActionEntry", modGlobal.GetExceptionInfo(ex), "frmActionEntry->btnOpenDoc_Click", currentUser.getEmployeeName())
        End Try
    End Sub

There are some interesting aspects to note here. You have to use a SecureString for the password when using ProcessStartInfo, and can only be assigned per character, and more importantly, I had to set UseShellExecute property to False.

I was hopeful that this would work, but after some iterations I got stuck on this error message:

Error Message Example

I figured out that this was due to being unable to access Windows Shell to find the default program to open the corresponding file type with, so it just expected an executable. After more research I was unable to find a clean way to get around this so I've decided to go about addressing this file upload a different way.

Levi
  • 21
  • 1
  • 9
1

I know this is an old question, but maybe it can help someone else, I had the same problem and finally, realized that it's not enough to grant access to the impersonate user to read and write on the folder but also modify, if you don't, the user can not delete the file.