In IIS 7 (not IIS ), sites access files and folders based on the account set on the application pool for the site. By default, in IIS7, this account is. Whenever a new application pool is created, IIS creates a security identifier (SID) that represents the name of the application pool itself.
This article describes how to migrate UNIX permissions to the IIS permission system and how to set IIS permissions for a Web site, a folder. This topic describes how to set process identity and user access rights for an IIS application host process and gives some general guidelines.
Whenever a new application pool is created, IIS creates a security identifier (SID) that represents the name of the application pool itself. The Shared drive is coming from Server File Server. I have tried all type of permission change Application pool identity, connect as but none of them work. If that doesn't work, give the machine account access to the Share and NTFS permissions on the share.
The process is entirely managed in IIS using inherited privileges. Applying Modify /Write Permissions to the Correct User Account. Right-click. Under IIS (and optionally in IIS 7) all workers run with Application Pool Identity: user "IIS AppPool*PoolName*". Grant access to that user.
Web access permissions use the IUSR_ computername account by default. When you install IIS, the IUSER_ computername account is created. If you upload a file to a virtual directory that has these permissions enabled, The authenticated user (or IIS's Anonymous user for anonymous.
KB - Granting folder permissions to IIS application pools Windows Explorer and adding the "Smartcrypt" identity to the folder's Access Control. ApplicationPoolIdentity is actually the best practice to use in IIS7+. It is a dynamically created, unprivileged account. To add file system security.