I am working on an ASP.NET Core Web App that needs to talk to two different SQL Server databases. The Web App is running under a Windows Service Account in IIS that is specific to this app, app pool, and server. I have real Windows users that will be using this app via Chrome for various CRUD operations. I am being encouraged to follow the Principal of Least Privilege and split out the Read actions and Create/Update/Delete actions into two separate accounts, for each database, resulting in 4 accounts accessing SQL across 2 databases.
Currently, the app is only hitting one database and our single connection string is just specifying the Windows Authentication, so all database operations are performed by the service account running the app in IIS.
I want to use multiple Windows Accounts, one for Read actions, one for Create/Update/Delete actions. How do I configure IIS and my code and web.config to use Impersonation via Kerberos to have individual end user accounts be the ones performing database operations?
6