This is going to be a very short Blog Post, not to say a brain dump, but if you ever need to retrieve the credentials used in a Specific ApplicationPool in IIS, you can use the following snippet of PowerShell code to do so:
$appPools = Get-WebConfiguration -Filter '/system.applicationHost/applicationPools/add' foreach($appPool in $appPools) { if($appPool.ProcessModel.identityType -eq "SpecificUser") { Write-Host $appPool.Name -ForegroundColor Green -NoNewline Write-Host " -"$appPool.ProcessModel.UserName"="$appPool.ProcessModel.Password } }
This will output something similar to the following:
Now, I am sure some of you are probably freaking out by now, realizing that people with access to the server can easily retrieve the credentials from IIS app pools that are running as a specific user. Let me assure you that there is nothing magic about the PowerShell code above. When you specify credentials for an IIS application pool, after verifying against Active Directory that the provided credentials are valid, IIS will go and actually encrypt and store those credentials locally. Using the Get-WebConfiguration cmdlet allows you to retrieve and decrypt those.
So yes, the moment a user has access to run the PowerShell cmdlet on the server, he is also able to retrieved stored credentials for users running the app pool.