Machine Key (2024)

  • Article

Applies To: Windows Server 2012 R2, Windows Server 2012

Use the Machine Key feature page to configure hashing and encryption settings used for application services, such as view state, Forms authentication, membership and roles, and anonymous identification. Machine keys are also used to verify out-of-process session state identification.

Note

If you deploy your application in a web farm, make sure that the configuration files on each server in the web farm have the same value for the validation key and decryption keys, which are used for hashing and decryption respectively. Otherwise, you cannot guarantee which server handles successive requests.

Related scenarios

UI Elements for Machine Key

The following tables describe the UI elements that are available on the feature page and in the Actions pane.

Feature Page Elements

Element Name

Description

Validation method

Select one of the following options to specify the validation method the machine key uses:

  • AES - Advanced Encryption Standard (AES) is relatively easy to implement and requires little memory. AES has a key size of 128, 192, or 256 bits. This method uses the same private key to encrypt and decrypt data, whereas a public-key method must use a pair of keys.

  • MD5 - Message Digest 5 (MD5) is used for digital signing of applications, for example, mail messages. This method produces a 128-bit message digest, which is a compressed form of the original data. MD5 can provide some protection against computer viruses and programs that mimic harmless applications but are destructive.

  • SHA1 – This method is the default setting. SHA1 is considered to be more secure than MD5 because it produces a 160-bit message digest. Use SHA1 encryption whenever possible.

  • TripleDES - Triple Data Encryption Standard (TripleDES) is a minor variation of Data Encryption Standard (DES). It is three times slower than regular DES but can be more secure because it has a key size of 192 bits. If performance is not your primary consideration, consider using TripleDES.

  • HMACSHA256 - Hash-based Message Authentication Code (HMAC) mixes a secret key with the message data, hashes the result with the hash function, mixes that hash value with the secret key again, and then applies the hash function a second time. The output hash is 256 bits in length.

  • HMACSHA384 - Hash-based Message Authentication Code (HMAC) with an output has that is 384 bits long.

  • HMACSHA512 - Hash-based Message Authentication Code (HMAC) with an output has that is 512 bits long.

Encryption method

Select one of the following options to specify the encryption method the machine key uses:

  • Auto – This method is the default setting. Auto works with whichever encryption method you specified.

  • AES - Advanced Encryption Standard (AES) is relatively easy to implement and requires little memory. AES has a key size of 128, 192, or 256 bits. This method uses the same private key to encrypt and decrypt data, whereas a public-key method must use a pair of keys.

  • TripleDES - Triple Data Encryption Standard (TripleDES) is a minor variation of DES. It is three times slower than regular DES but can be more secure because it has a key size of 192 bits. If performance is not your primary consideration, consider using TripleDES.

  • DES - Data Encryption Standard (DES) uses a 56-bit key to both encrypt and decrypt data. If your server, site, or application does not require the strongest security, consider using DES.

Validation key

Computes a Message Authentication Code (MAC) to confirm the integrity of the data. This key is appended to either the Forms authentication cookie or the view state for a specific page.

Select one of the following options to specify how the validation key is generated:

  • Automatically generate at runtime: Instructs ASP.NET to generate a random key at runtime.

  • Generate a unique key for each application: Isolates applications from one another by generating a unique key for each application based on the application ID of each application. If your application is deployed in a web farm, duplicate your application's key across all servers in the farm.

Decryption key

Used to encrypt and decrypt Forms authentication tickets and view state.

Select one of the following options to specify how the decryption key is generated:

  • Automatically generate at runtime: Instructs ASP.NET to generate a random key at runtime.

  • Generate a unique key for each application: Isolates applications from one another by generating a unique key for each application based on the application ID of each application. If your application is deployed in a web farm, duplicate your application's key across all servers in the farm.

Actions Pane Elements

Element Name

Description

Apply

Saves the changes that you have made on the feature page.

Cancel

Cancels the changes that you have made on the feature page.

Generate Keys

Generates a validation key and a decryption key in the corresponding boxes on the feature page.

Machine Key (2024)
Top Articles
Managing Certificate Export for PFX with Our Easy Tool
Can AI really predict stock market?
Dragon Age Inquisition War Table Operations and Missions Guide
Food King El Paso Ads
Noaa Charleston Wv
Belle Meade Barbershop | Uncle Classic Barbershop | Nashville Barbers
Collision Masters Fairbanks
Polyhaven Hdri
Wild Smile Stapleton
Whiskeytown Camera
Weather Annapolis 10 Day
World of White Sturgeon Caviar: Origins, Taste & Culinary Uses
Taylor Swift Seating Chart Nashville
Athens Bucket List: 20 Best Things to Do in Athens, Greece
8 Ways to Make a Friend Feel Special on Valentine's Day
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Video shows two planes collide while taxiing at airport | CNN
Pay Boot Barn Credit Card
V-Pay: Sicherheit, Kosten und Alternativen - BankingGeek
Wnem Tv5 Obituaries
Renfield Showtimes Near Paragon Theaters - Coral Square
Access a Shared Resource | Computing for Arts + Sciences
What we lost when Craigslist shut down its personals section
A Man Called Otto Showtimes Near Carolina Mall Cinema
Viduthalai Movie Download
Publix Christmas Dinner 2022
Possum Exam Fallout 76
Primerica Shareholder Account
Productos para el Cuidado del Cabello Después de un Alisado: Tips y Consejos
Syracuse Jr High Home Page
Otis Offender Michigan
Scioto Post News
Haley Gifts :: Stardew Valley
One Credit Songs On Touchtunes 2022
Appraisalport Com Dashboard /# Orders
Devin Mansen Obituary
Laff Tv Passport
Trap Candy Strain Leafly
Lake Andes Buy Sell Trade
All Obituaries | Sneath Strilchuk Funeral Services | Funeral Home Roblin Dauphin Ste Rose McCreary MB
Sun Tracker Pontoon Wiring Diagram
The Conners Season 5 Wiki
3 Zodiac Signs Whose Wishes Come True After The Pisces Moon On September 16
Tricare Dermatologists Near Me
Mychart University Of Iowa Hospital
Autozone Battery Hold Down
Tlc Africa Deaths 2021
What your eye doctor knows about your health
Bomgas Cams
How to Find Mugshots: 11 Steps (with Pictures) - wikiHow
Https://Eaxcis.allstate.com
Latest Posts
Article information

Author: Foster Heidenreich CPA

Last Updated:

Views: 5916

Rating: 4.6 / 5 (56 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Foster Heidenreich CPA

Birthday: 1995-01-14

Address: 55021 Usha Garden, North Larisa, DE 19209

Phone: +6812240846623

Job: Corporate Healthcare Strategist

Hobby: Singing, Listening to music, Rafting, LARPing, Gardening, Quilting, Rappelling

Introduction: My name is Foster Heidenreich CPA, I am a delightful, quaint, glorious, quaint, faithful, enchanting, fine person who loves writing and wants to share my knowledge and understanding with you.