You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the scenario that you want to host a NamedPipe based GRPC service in a windows service, you cannot subsequently connect to the service from a client running under a standard user account. This is because the NamedPipe is created with default security permissions.
While the default ACLs do give read access to Everyone, I think the client also needs Write access to allow it to send GRPC messages to the service.
It seems like a good solution would be to allow the creator of the service to specify the security ACLs to apply to the internally created NamedPipe stream.
The text was updated successfully, but these errors were encountered:
In the scenario that you want to host a NamedPipe based GRPC service in a windows service, you cannot subsequently connect to the service from a client running under a standard user account. This is because the NamedPipe is created with default security permissions.
While the default ACLs do give read access to Everyone, I think the client also needs Write access to allow it to send GRPC messages to the service.
It seems like a good solution would be to allow the creator of the service to specify the security ACLs to apply to the internally created NamedPipe stream.
The text was updated successfully, but these errors were encountered: