We recently released the latest version of our intranet application, which now uses Windows authentication as standard and should be able to connect to a configured SQL server with end-user domain credentials.
Recently, we found that on several client deployments, although IIS can see the domain user credentials, it will not pass them to the SQL server. Instead, it uses an anonymous account. This is despite all the right steps (changing directory security on Win Auth, updating Web.Config to use Win Auth and rejecting anonymous users).
I read a lot, which suggests that we need to make sure Kerberos is in place, but I'm not sure (a) how fair this is (i.e. is this a requirement?) Or (b) how to start an investigation, if configured or how to configure it.
We are in a situation where we need to be able to configure the IIS or application to work for the client or explain to the client exactly what they need to do to make it work.
We managed to reproduce this on our internal network using the test SQL server and the IIS developer box, so we are going to team up with this setting and see if we can come up with a solution, but if anyone has bright ideas, I would be happy to hear them!
I especially wanted to hear people's thoughts or advice in terms of Kerberos. Is this a requirement, and if so, how can I tell clients how it should be configured?
Oh, and I also noticed that a few people mention the “classic one-hop rule” for domains and transferring Windows credentials, but I don’t know how much weight this really takes place?
Thanks!
Matt
Matt winward
source share