Deploying Microix Modern Application on IIS Server

Creation date: 3/5/2026 9:20 PM    Updated: 3/6/2026 8:46 AM   wan acess web access

šŸ“– Overview

This article explains deployment options for hosting Microix Modern Server application on Microsoft Internet Information Services (IIS). Because customer environments vary, the recommended deployment model depends on whether the application is intended for:

  • LAN access only
  • WAN access in addition to LAN access

This article also outlines infrastructure, security, authentication, SQL connectivity, and file storage considerations for each scenario.


🧭 Supported Deployment Scenarios

Microix Modern application hosted on IIS can generally be deployed in one of the following ways:

1. IIS Server on the Internal LAN (No WAN Access)
The application is accessible only from within the internal network. The IIS application can be installed either on the existing MIP/Microix server or on a separate IIS server within the LAN.

2. IIS Server on the Internal LAN with WAN Access
External users access the application through the internet. This typically requires the firewall to allow inbound HTTPS traffic on port 443, along with a properly configured SSL certificate in IIS.
In this scenario, the application should be deployed on a separate IIS server and should not be installedon the MIP/Microix SQL Server.

3. IIS Server Located in a DMZ for WAN Access

In this configuration, the IIS server is placed in a DMZ (Demilitarized Zone) to isolate the web application from the internal network. External users connect to the IIS server in the DMZ, and controlled firewall rules allow the application to communicate with required internal services. Because DMZ servers often do not have access to Active Directory, the application will need to use a SQL authentication account instead of a domain account for database access.


⭐ General Recommendation

The preferred deployment model should align with the customer’s security policy, network architecture, and access requirements.

Best practice summary

  • For internal-only users, deploy the IIS service (web sockets enabled
  • For external/WAN access, there are two common options:
    • Host IIS on the LAN and publish it externally through the customer’s security infrastructure.
    • Host IIS on a DMZ server when network segmentation and security controls require isolation from the internal LAN.

šŸ–„ļø Scenario 1: LAN Access Only

Description

In this model, the application is deployed to a Server located on the customer’s internal network (MIP\Microix Server for small deployment workload or a separate IIS Server). Users access the application only from within the LAN.

Recommended use case

  • All users are internal users
  • No internet-based access is required
  • The simplest and most secure deployment model

Best practices

  • Deploy IIS Service on a server within the LAN 
  • Limit application access to internal network users only
  • Use a non-administrative domain service account for the IIS application pool identity
  • Grant that account only the permissions required to:
    • Access the MIP\Microix SQL Server
    • Access the network file path used to store attachments

🌐 Scenario 2: WAN Access with IIS Hosted on the LAN

Description

In this model, the IIS server remains on the internal LAN, but the application is made available for WAN access through the customer’s existing perimeter security controls, such as firewall/NAT, reverse proxy, VPN, or other secure publishing methods.

Recommended use case

  • External users need access to the application
  • The customer prefers to keep the IIS server inside the LAN 
  • Internal infrastructure teams can securely publish the application for WAN access

Best practices

  • Keep the IIS server on the LAN and use a separate server from the MIP\Microix Server
  • Publish the application externally using the customer’s approved secure access method
  • Use HTTPS/TLS for all external traffic
  • Restrict inbound access to only required ports and sources
  • Use a non-administrative domain account for the IIS application pool identity
  • Grant that account only the permissions required to:
    • Connect to the MIP\Microix SQL Server
    • Access the network file share/path used for attachments

šŸ›”ļø Scenario 3: WAN Access with IIS Hosted in a DMZ

Description

In this model, the application is deployed to an IIS server located in a DMZ. This is typically used when the customer requires internet-facing services to be isolated from the internal LAN.

Recommended use case

  • The customer requires strict network segmentation
  • Security policy requires internet-facing web servers to reside in a DMZ
  • The customer does not permit direct WAN publishing to an IIS server on the LAN

Best practices

  • Deploy IIS to a DMZ server (with WebSocket Enabled)
  • Allow only the minimum required ports and network flows between the DMZ and internal resources
  • Use HTTPS/TLS for all external access
  • Use least-privilege service configuration
  • Avoid dependency on Active Directory if the DMZ server has no access to domain service

āš™ļø Deployment Requirements

Before deploying the web application on IIS, ensure the following requirements are met.

Database Requirements

  • Microsoft SQL Server 2017 or later is required.
  • The IIS server must be able to communicate with the SQL Server instance.
  • Ensure TCP port 1433 (or the configured SQL Server port) is open between the IIS server and the SQL Server.
  • The application requires appropriate database credentials (either Active Directory domain account or SQL authentication, depending on the deployment model).

Network Access Requirements

  • The IIS server must have network connectivity to:

    • The SQL Server hosting the Microix and MIP databases
    • The network file share used for attachment storage
  • Ensure required firewall rules are configured between servers.

WAN Deployment Requirements (Mobile Approval / External Access)

  • If users need to access the application outside the internal network (for example, mobile approvals), the application must be accessible through WAN deployment.
  • This typically requires:
    • Firewall configuration allowing inbound HTTPS (TCP 443) traffic
    • Public DNS configuration or external access method approved by the organization

SSL Certificate (Recommended for WAN Deployment)

  • An SSL certificate should be installed on the IIS server when the application is accessible from the internet.
  • HTTPS ensures that all communication between users and the application is encrypted and secure.
  • SSL certificates may be obtained from:
    • A trusted public certificate authority
    • The organization’s internal certificate authority


šŸ› ļø Summary of Common Ports

ServiceProtocolDefault PortPurpose
HTTPSTCP443External access to IIS
SQL ServerTCP1433Database communication
SMB File ShareTCP445Access to attachment storage
LDAPTCP/UDP389Active Directory authentication
LDAPSTCP636Secure LDAP
KerberosTCP/UDP88Domain authentication
DNSTCP/UDP53Name resolution