{"id":759,"date":"2023-08-01T20:33:33","date_gmt":"2023-08-01T12:33:33","guid":{"rendered":"https:\/\/www.ruianding.com\/blog\/?p=759"},"modified":"2023-09-14T00:58:38","modified_gmt":"2023-09-13T16:58:38","slug":"system-context-versus-user-context","status":"publish","type":"post","link":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/","title":{"rendered":"System Context versus User Context"},"content":{"rendered":"\n<p><strong>System Context<\/strong> and <strong>User Context<\/strong> are concepts related to how applications or processes interact with the operating system and network resources. They are important in understanding the security, privileges, and settings that different applications or tasks have when connecting to the internet or other network resources.<\/p>\n\n\n\n<p>In this article, we will explore the significance of System Context and User Context, examining how they impact the way non-interactive Windows services and applications <strong>connect to the internet<\/strong>. We will also dive into common methods used to set network proxies for these distinct contexts, providing best practices for ensuring seamless connectivity. Additionally, we&#8217;ll discuss quick and effective approaches to identify network connectivity issues and how to determine if network proxy settings are in use.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">This post is inspired by the sharing from SEE Seven Li<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">1. <strong>System Context and User Context<\/strong><\/h3>\n\n\n\n<p>From a network connection perspective, non-interactive Windows services or background tasks run in <strong>&#8220;System Context&#8221;<\/strong> and utilize the <strong>WinHTTP API<\/strong> to connect to the internet. Examples include services running with the Local System account and the Automatic-Device-Join scheduler task.<\/p>\n\n\n\n<p>On the other hand, applications that leverage the <strong>WinINET API<\/strong> to connect to the internet run in <strong>&#8220;User Context&#8221;<\/strong> Each user logging into Windows OS will have their own <strong>&#8220;context&#8221;<\/strong>, which explains why the IE proxy settings are different per user by default.<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/wininet\/wininet-vs-winhttp\">https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/wininet\/wininet-vs-winhttp<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1.1 Examples<\/h4>\n\n\n\n<p>Processes that running with SYSTEM account and USER (Administrator) account:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image.png\" alt=\"\" class=\"wp-image-762\" width=\"585\" height=\"145\"\/><\/figure>\n\n\n\n<p>Services that running with Local System Account:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image-1.png\" alt=\"\" class=\"wp-image-763\" width=\"618\" height=\"140\"\/><\/figure>\n\n\n\n<p>In the Hybrid Azure AD Join scheduled task, the task is running under SYSTEM account:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image-2.png\" alt=\"\" class=\"wp-image-764\" width=\"445\" height=\"382\"\/><\/figure>\n\n\n\n<p>When launching the application, it operates within the User Context, specifically under the User account:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image-3.png\" alt=\"\" class=\"wp-image-765\" width=\"389\" height=\"175\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">2. <strong>Common methods to set network proxy for different contexts<\/strong><\/h3>\n\n\n\n<p>Both <strong>WinINET<\/strong> and <strong>WinHTTP<\/strong> can be configured to use network proxies using different mechanisms:<br>a. Proxy auto-configuration scripts.<br>b. Auto-discovery.<br>c. Manual configuration.<\/p>\n\n\n\n<p>We can configure the network proxy settings in the <strong>Internet Properties<\/strong> for <strong>WinINET (User context)<\/strong>, and use <code>netsh winhttp set proxy<\/code> for <strong>WinHTTP (System context)<\/strong>. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image-4.png\" alt=\"\" class=\"wp-image-766\" width=\"459\" height=\"334\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image-5.png\" alt=\"\" class=\"wp-image-767\" width=\"478\" height=\"173\"\/><\/figure>\n\n\n\n<p class=\"has-pale-cyan-blue-background-color has-background has-small-font-size\">Both WinINET and WinHTTP can be configured with WPAD (Web Proxy Auto-Discovery).<br><a href=\"https:\/\/en.wikipedia.org\/wiki\/Web_Proxy_Auto-Discovery_Protocol\">Web Proxy Auto-Discovery Protocol &#8211; Wikipedia<\/a><\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-pale-pink-background-color has-background has-small-font-size\">WPAD settings and network requirements also listed in the <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/devices\/how-to-hybrid-join\">Configure hybrid Azure Active Directory join<\/a> document.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\"\/>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">3. Quickly identifying network connectivity issues (Hybrid Azure AD Join)<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">3.1 Use the dsregtool PowerShell script to quickly test internet connectivity under the system context<\/h4>\n\n\n\n<p class=\"has-pale-cyan-blue-background-color has-background has-small-font-size\">Download the dsregtool here: <a href=\"https:\/\/gallery.technet.microsoft.com\/Test-Device-Registration-3dc944c0\"><\/a><a href=\"https:\/\/learn.microsoft.com\/en-us\/samples\/azure-samples\/dsregtool\/dsregtool\/\">Device Registration Troubleshooter Tool &#8211; Code Samples | Microsoft Learn<\/a>. <\/p>\n\n\n\n<p>The script schedules quick background tasks (under system context) to test the connectivity with DRS endpoints.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"669\" height=\"251\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image-7.png\" alt=\"\" class=\"wp-image-773\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">3.2 Leverage PsExec Tool to run either IE or PowerShell for testing connectivity. <\/h4>\n\n\n\n<p>Refer to this post: <a href=\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/\">Execute Processes Remotely with PsExec Tool &#8211; Ruian&#8217;s Tech Troubleshooting Toolbox (ruianding.com)<\/a><\/p>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background has-small-font-size\">Please keep in mind that successful access from the browser without PsExec only confirms the connection is good for the <strong>user context<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3.3 Capture the network trace<\/h4>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">4. Identify if we are using the network proxy settings<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">4.1 For WinHTTP proxy settings (System context)<\/h4>\n\n\n\n<p>Check the registry key:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Connections<br>Key Name: WinHttpSettings<br>Type: REG_BINARY<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image-8.png\" alt=\"\" class=\"wp-image-774\" width=\"342\" height=\"184\"\/><\/figure>\n\n\n\n<p>Also use the CMD <code>netsh winhttp show proxy<\/code><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"544\" height=\"116\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image-9.png\" alt=\"\" class=\"wp-image-775\"\/><\/figure>\n\n\n\n<p class=\"has-pale-cyan-blue-background-color has-background has-small-font-size\">Reference: <a href=\"https:\/\/learn.microsoft.com\/en-us\/archive\/blogs\/netgeeks\/winhttp-proxy-settings-deployed-by-gpo\">WinHTTP Proxy Settings deployed by GPO | Microsoft Learn<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">4.2 For WinINET proxy settings (User context)<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\nKey Name: ProxyServer\nType: REG_SZ<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image-10.png\" alt=\"\" class=\"wp-image-776\" width=\"692\" height=\"250\"\/><\/figure>\n\n\n\n<p class=\"has-pale-cyan-blue-background-color has-background has-small-font-size\">Reference: <a href=\"https:\/\/learn.microsoft.com\/en-us\/archive\/blogs\/askie\/how-to-configure-proxy-settings-for-ie10-and-ie11-as-iem-is-not-available\">How to configure Proxy Settings for IE10 and IE11 as IEM is not available | Microsoft Learn<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>System Context and User Context are concepts related to how applications or processes interact with the operating system and network resources. They are important in understanding the security, privileges, and settings that different applications or tasks have when connecting to the internet or other network resources. In this article, we will explore the significance of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[32,36],"tags":[],"class_list":["post-759","post","type-post","status-publish","format-standard","hentry","category-aad-general","category-drs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>System Context versus User Context - \u6781\u7b80IT\uff5cSimpleIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"System Context versus User Context - \u6781\u7b80IT\uff5cSimpleIT\" \/>\n<meta property=\"og:description\" content=\"System Context and User Context are concepts related to how applications or processes interact with the operating system and network resources. They are important in understanding the security, privileges, and settings that different applications or tasks have when connecting to the internet or other network resources. In this article, we will explore the significance of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/\" \/>\n<meta property=\"og:site_name\" content=\"\u6781\u7b80IT\uff5cSimpleIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-01T12:33:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-13T16:58:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image.png\" \/>\n<meta name=\"author\" content=\"Ruian Ding\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ruian Ding\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/\"},\"author\":{\"name\":\"Ruian Ding\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"headline\":\"System Context versus User Context\",\"datePublished\":\"2023-08-01T12:33:33+00:00\",\"dateModified\":\"2023-09-13T16:58:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/\"},\"wordCount\":532,\"publisher\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"image\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image.png\",\"articleSection\":[\"AAD General\",\"DRS\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/\",\"url\":\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/\",\"name\":\"System Context versus User Context - \u6781\u7b80IT\uff5cSimpleIT\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image.png\",\"datePublished\":\"2023-08-01T12:33:33+00:00\",\"dateModified\":\"2023-09-13T16:58:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#primaryimage\",\"url\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image.png\",\"contentUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image.png\",\"width\":1118,\"height\":277},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ruianding.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"System Context versus User Context\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#website\",\"url\":\"https:\/\/www.ruianding.com\/blog\/\",\"name\":\"Ruian's Tech Troubleshooting Toolbox\",\"description\":\"Debug the World.\",\"publisher\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"alternateName\":\"\u4e01\u777f\u5b89\u7684\u6280\u672f\u5206\u4eab\u535a\u5ba2\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ruianding.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\",\"name\":\"Ruian Ding\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png\",\"contentUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png\",\"width\":284,\"height\":284,\"caption\":\"Ruian Ding\"},\"logo\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/\"},\"description\":\"I am currently a Support Specialist at NIO, focusing on cloud-related issues for NIO Power. Previously, at Microsoft Entra ID, I specialized in identity and access management (IAM), including device registration, Windows Hello for Business (WHfB), multi-factor authentication (MFA), and single sign-on (SSO). In addition to my core expertise, I have a strong foundation in Active Directory, Servers, Cloud Computing, Network Administration, and Front-end Web Development. This diverse technical skill set enables me to effectively handle a wide range of challenges in a fast-paced IT environment.\",\"sameAs\":[\"https:\/\/www.ruianding.com\"],\"url\":\"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"System Context versus User Context - \u6781\u7b80IT\uff5cSimpleIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/","og_locale":"en_US","og_type":"article","og_title":"System Context versus User Context - \u6781\u7b80IT\uff5cSimpleIT","og_description":"System Context and User Context are concepts related to how applications or processes interact with the operating system and network resources. They are important in understanding the security, privileges, and settings that different applications or tasks have when connecting to the internet or other network resources. In this article, we will explore the significance of [&hellip;]","og_url":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/","og_site_name":"\u6781\u7b80IT\uff5cSimpleIT","article_published_time":"2023-08-01T12:33:33+00:00","article_modified_time":"2023-09-13T16:58:38+00:00","og_image":[{"url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image.png","type":"","width":"","height":""}],"author":"Ruian Ding","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ruian Ding","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#article","isPartOf":{"@id":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/"},"author":{"name":"Ruian Ding","@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"headline":"System Context versus User Context","datePublished":"2023-08-01T12:33:33+00:00","dateModified":"2023-09-13T16:58:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/"},"wordCount":532,"publisher":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"image":{"@id":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image.png","articleSection":["AAD General","DRS"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/","url":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/","name":"System Context versus User Context - \u6781\u7b80IT\uff5cSimpleIT","isPartOf":{"@id":"https:\/\/www.ruianding.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#primaryimage"},"image":{"@id":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image.png","datePublished":"2023-08-01T12:33:33+00:00","dateModified":"2023-09-13T16:58:38+00:00","breadcrumb":{"@id":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#primaryimage","url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image.png","contentUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/08\/image.png","width":1118,"height":277},{"@type":"BreadcrumbList","@id":"https:\/\/www.ruianding.com\/blog\/system-context-versus-user-context\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ruianding.com\/blog\/"},{"@type":"ListItem","position":2,"name":"System Context versus User Context"}]},{"@type":"WebSite","@id":"https:\/\/www.ruianding.com\/blog\/#website","url":"https:\/\/www.ruianding.com\/blog\/","name":"Ruian's Tech Troubleshooting Toolbox","description":"Debug the World.","publisher":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"alternateName":"\u4e01\u777f\u5b89\u7684\u6280\u672f\u5206\u4eab\u535a\u5ba2","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ruianding.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b","name":"Ruian Ding","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png","contentUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png","width":284,"height":284,"caption":"Ruian Ding"},"logo":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/"},"description":"I am currently a Support Specialist at NIO, focusing on cloud-related issues for NIO Power. Previously, at Microsoft Entra ID, I specialized in identity and access management (IAM), including device registration, Windows Hello for Business (WHfB), multi-factor authentication (MFA), and single sign-on (SSO). In addition to my core expertise, I have a strong foundation in Active Directory, Servers, Cloud Computing, Network Administration, and Front-end Web Development. This diverse technical skill set enables me to effectively handle a wide range of challenges in a fast-paced IT environment.","sameAs":["https:\/\/www.ruianding.com"],"url":"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/comments?post=759"}],"version-history":[{"count":9,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/759\/revisions"}],"predecessor-version":[{"id":954,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/759\/revisions\/954"}],"wp:attachment":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/media?parent=759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/categories?post=759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/tags?post=759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}