RE: [ActiveDir] Kerberos Delegation

2005-09-22 Thread Roger Seielstad



Speaking of being here next week - keep me informed on the 
activities... 

Roger SeielstadE-mail Geek 



From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Carlos 
MagalhaesSent: Wednesday, September 21, 2005 5:39 AMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation


Yeah Im not sure about 
that either at the moment IIS is REALLY ACTING WEIRD, KEN where are you :P - 
.

I had the Share Point 
website in the IIS MMC specify SPSAppPool (which was a App pool I created) when 
I checked the MetaBase.XML file ( you know I love looking at the guts of 
systemsJ ) it was still 
specifying DefaultAppPool (and I mean I had rebooted the server a few times) 
also DO NOT RUN: 

Cscript adsutil.vbs 
set w3svc/1/ntauthenticationproviders Negotiate,NTLM
Iisreset

I know it seems logical 
but I KEPT the quotations in there and what it ended up doing was: 
Negotiate,NTLM 
***Note the double quotes

And all auth was being 
defaulted to Anonymous (thank heavens for a network sniffer J 
)

Even though I fixed 
these issues and I have made sure my Metabase.xml file is correct with 
Negotiate,NTLM and with the correct App Pool with the correct user etc, 
when I run AuthDiag the only Test Authentication option I get is NTLM, 
the Server Settings Node though specifies Negotiate,NTLM for that Site. 


When I check my ISA 
server I STILL see User  Anonymous so I am a bit stumped at the moment 
!!!

YEAH it going to be 
so cool to meet up with you guys in Redmond next week J

C





From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Tony 
MurraySent: 20 September 2005 
10:50 PMTo: ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Hi 
Carlos

As I said, I'm just 
starting to look at Kerberos delegation, so take everything I say with a large 
pinch of salt. :-)

Anyway, here's the 
logic I was following.

If I've understood it 
correctly, you want the server hosting SharePoint to authenticate to the ISA 
server as the end user. Assuming you want to use constrained delegation 
(which is normal) then you need to specify the ISA Server somewhere in the 
configuration, because you are limiting (constraining)the scope of the 
delegation to the ISA Server. If you look at the Delegation tab of an 
object in ADUC, you will see the section labeled "Services to which this account 
can present delegated credentials:" It would seem logical to me to have to 
specify the ISA here. Now whether you need to do configure this setting in 
ADUC on the account being used for the identity of the application pool, or the 
SharePoint server itself I don't know.



Cheers

Tony



PS. See you next 
week :-)




From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Carlos 
MagalhaesSent: Wednesday, 21 
September 2005 1:38 a.m.To: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation
Hey 
Tony,

Well can you explain 
but wouldn't you also 
need an SPN for the web service on the ISA Server? I dont understand 
why, the ISA server is the server that is needing the authentication to allow 
the web server to browse the internet. 
So to 
elaborate:

I have a Share Point 
site it has a RSS feed web part, this web part is requesting a RSS feed for 
example http://www.dirteam.com/blogs/carlos/default.aspx 
now I monitor on the ISA 2004 server and I see the web server trying to access 
the internet the user specified = Anonymous. The delegation is so that the user 
viewing the Share Point site (hence calling the RSS web part) will be the user 
credentials passed to the ISA server to be able to browse the 
internet.

Thats why I dont see 
why we need to register a SPN for the ISA server?

ThanksC





From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Tony 
MurraySent: 20 September 2005 
01:17 AMTo: ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Hi 
Carlos

I'm just starting to 
look at Kerberos delegation for something myself,but wouldn't you also 
need an SPN for the web service on the ISA Server? And then specify that 
serviced in the delegation tab on the user object?

Cheers
Tony




From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Carlos 
MagalhaesSent: Tuesday, 20 
September 2005 9:31 a.m.To: 
ActiveDir@mail.activedir.orgSubject: [ActiveDir] Kerberos 
Delegation
Hey 
all,

Ok late at night here and Ive hit a 
mental block (dont laugh Dean). I have set this up like a gazillion times but 
this time cant get it to work.

Environment: 


Windows 2003 Native Forest Mode  
All clients Windows XP SP2 and above

Single forest single domain 
setup

Web Server  Windows Server 2003 Web 
Edition
Share Point Team Services 
installed.

That site has a web part that 
requires Kerb delegation for access to a ISA firewall in order to stream RSS 
feeds. I can see on the ISA server that when ever any user hits the site the 
HTTP request is sent as ANONYMOUS.

So what I have 
done:


  I 

RE: [ActiveDir] Kerberos Delegation

2005-09-22 Thread Roger Seielstad



So have you granted domain\IISServer$ access through 
ISA?

Roger SeielstadE-mail Geek 



From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Carlos 
MagalhaesSent: Wednesday, September 21, 2005 8:16 AMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation


Well I have some screen 
shots for you of AuthDiag and of wfetch, if you dont mind I can send it to you 
offline.

This is the weird part, 
if I use wfetch to connect using Anonymous as authentication I get the web page 
requested. 

If I specify any other 
auth type i.e. NTLM or Kerberos I get a ISA server page telling me I am not 
authorized to view this page.

With anonymous 
connection I get:
WWW-Authenticate: 
Negotiate
WWW-Authenticate: 
NTLM

With a specified auth 
type I dont get any of that (The screen shots 
explain)

AuthDiag still only 
reports Test Authentication NTLM NO Kerberos.

I still have a copy of 
the old Metabase.xml to prove that it was storing the incorrect settings when 
IIS MMC was showing something else..

Let me know if I can 
ping the screen shots to you.

Thanks Ken, am I going 
to get to see you at Redmond?
C






From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Ken 
SchaeferSent: 21 September 
2005 03:17 PMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Odd.

If you use WFetch (its 
in the IIS6 Res Kit) or just plain telnet, and request a page, what 
WWW-Authenticate headers are coming back? You should 
see:

WWW-Authenticate: 
Negotiate
WWW-Authenticate: 
NTLM

(basically the 
webserver sends back a list of the auth mechanisms it supports, and the browser 
picks the first one in the list that it supports). If you are only seeing the 
NTLM option, then somethings up with IIS or Sharepoint. If you are seeing both, 
then AuthDiag is lying to you.

Cheers
Ken






From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Carlos 
MagalhaesSent: Wednesday, 21 
September 2005 10:39 PMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Yeah Im not sure about 
that either at the moment IIS is REALLY ACTING WEIRD, KEN where are you :P - 
.

I had the Share Point 
website in the IIS MMC specify SPSAppPool (which was a App pool I created) when 
I checked the MetaBase.XML file ( you know I love looking at the guts of 
systemsJ ) it was still 
specifying DefaultAppPool (and I mean I had rebooted the server a few times) 
also DO NOT RUN: 

Cscript adsutil.vbs 
set w3svc/1/ntauthenticationproviders Negotiate,NTLM
Iisreset

I know it seems logical 
but I KEPT the quotations in there and what it ended up doing was: 
Negotiate,NTLM 
***Note the double quotes

And all auth was being 
defaulted to Anonymous (thank heavens for a network sniffer J 
)

Even though I fixed 
these issues and I have made sure my Metabase.xml file is correct with 
Negotiate,NTLM and with the correct App Pool with the correct user etc, 
when I run AuthDiag the only Test Authentication option I get is NTLM, 
the Server Settings Node though specifies Negotiate,NTLM for that Site. 


When I check my ISA 
server I STILL see User  Anonymous so I am a bit stumped at the moment 
!!!

YEAH it going to be 
so cool to meet up with you guys in Redmond next week J

C





From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Tony 
MurraySent: 20 September 2005 
10:50 PMTo: ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Hi 
Carlos

As I said, I'm just 
starting to look at Kerberos delegation, so take everything I say with a large 
pinch of salt. :-)

Anyway, here's the 
logic I was following.

If I've understood it 
correctly, you want the server hosting SharePoint to authenticate to the ISA 
server as the end user. Assuming you want to use constrained delegation 
(which is normal) then you need to specify the ISA Server somewhere in the 
configuration, because you are limiting (constraining)the scope of the 
delegation to the ISA Server. If you look at the Delegation tab of an 
object in ADUC, you will see the section labeled "Services to which this account 
can present delegated credentials:" It would seem logical to me to have to 
specify the ISA here. Now whether you need to do configure this setting in 
ADUC on the account being used for the identity of the application pool, or the 
SharePoint server itself I don't know.



Cheers

Tony



PS. See you next 
week :-)




From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Carlos 
MagalhaesSent: Wednesday, 21 
September 2005 1:38 a.m.To: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation
Hey 
Tony,

Well can you explain 
but wouldn't you also 
need an SPN for the web service on the ISA Server? I dont understand 
why, the ISA server is the server that is needing the authentication to allow 
the web server to browse the internet. 
So to 
elaborate:

I have a Share Point 
site it has a RSS feed web part, thi

RE: [ActiveDir] Kerberos Delegation

2005-09-22 Thread Ken Schaefer








Could I ask why hed need to do
that?



Cheers

Ken













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: Thursday, 22 September 2005
4:23 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





So have you granted domain\IISServer$
access through ISA?








Roger Seielstad
E-mail Geek 















From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, September 21,
2005 8:16 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation

Well I have some screen shots for you of
AuthDiag and of wfetch, if you dont mind I can send it to you offline.



This is the weird part, if I use wfetch to
connect using Anonymous as authentication I get the web page requested. 



If I specify any other auth type i.e. NTLM
or Kerberos I get a ISA server page telling me I am not authorized to view this
page.



With anonymous connection I get:

WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM



With a specified auth type I dont
get any of that (The screen shots explain)



AuthDiag still only reports Test
Authentication NTLM NO Kerberos.



I still have a copy of the old
Metabase.xml to prove that it was storing the incorrect settings when IIS MMC
was showing something else..



Let me know if I can ping the screen shots
to you.



Thanks Ken, am I going to get to see you
at Redmond?


C













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ken Schaefer
Sent: 21 September 2005 03:17 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Odd.



If you use WFetch (its in the IIS6
Res Kit) or just plain telnet, and request a page, what WWW-Authenticate
headers are coming back? You should see:



WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM



(basically the webserver sends back a list
of the auth mechanisms it supports, and the browser picks the first one in the
list that it supports). If you are only seeing the NTLM option, then
somethings up with IIS or Sharepoint. If you are seeing both, then
AuthDiag is lying to you.



Cheers

Ken













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005
10:39 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Yeah Im not sure about that either at the
moment IIS is REALLY ACTING WEIRD, KEN where are you :P - .



I had the Share Point website in the IIS
MMC specify SPSAppPool (which was a App pool I created) when I checked the
MetaBase.XML file ( you know I love looking at the guts of systemsJ ) it was still specifying
DefaultAppPool (and I mean I had rebooted the server a few times) also DO NOT
RUN: 



Cscript adsutil.vbs set
w3svc/1/ntauthenticationproviders Negotiate,NTLM

Iisreset



I know it seems logical but I KEPT the
quotations in there and what it ended up doing was: Negotiate,NTLM ***Note the
double quotes



And all auth was being
defaulted to Anonymous (thank heavens for a network sniffer J )



Even though I fixed
these issues and I have made sure my Metabase.xml file is correct with
Negotiate,NTLM and with the correct App Pool with the correct
user etc, when I run AuthDiag the only Test Authentication
option I get is NTLM, the Server Settings Node though specifies
Negotiate,NTLM for that Site. 



When I check my ISA
server I STILL see User  Anonymous so I am a bit stumped at the moment
!!!



YEAH it going to be
so cool to meet up with you guys in Redmond
next week J



C











From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Tony Murray
Sent: 20 September 2005 10:50 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Hi Carlos



As I said, I'm just starting to look at
Kerberos delegation, so take everything I say with a large pinch of salt.
:-)



Anyway, here's the logic I was following.



If I've understood it correctly, you want
the server hosting SharePoint to authenticate to the ISA server as the end user.
Assuming you want to use constrained delegation (which is normal) then you need
to specify the ISA Server somewhere in the configuration, because you are
limiting (constraining)the scope of the delegation to the ISA
Server. If you look at the Delegation tab of an object in ADUC, you will
see the section labeled Services to which this account can present
delegated credentials: It would seem logical to me to have to
specify the ISA here. Now whether you need to do configure this setting
in ADUC on the account being used for the identity of the application pool, or
the SharePoint server itself I don't know.









Cheers





Tony











PS. See you next week :-)











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005
1:38 a.m.
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation

Hey

RE: [ActiveDir] Kerberos Delegation

2005-09-22 Thread Carlos Magalhaes








Hmmm, explain a little more where you
would grant this access .



Thanks 

Carlos











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: 22 September 2005 08:23 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





So have you granted domain\IISServer$
access through ISA?








Roger Seielstad
E-mail Geek 















From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, September 21,
2005 8:16 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation

Well I have some screen shots for you of
AuthDiag and of wfetch, if you dont mind I can send it to you offline.



This is the weird part, if I use wfetch to
connect using Anonymous as authentication I get the web page requested. 



If I specify any other auth type i.e. NTLM
or Kerberos I get a ISA server page telling me I am not authorized to view this
page.



With anonymous connection I get:

WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM



With a specified auth type I dont
get any of that (The screen shots explain)



AuthDiag still only reports Test
Authentication NTLM NO Kerberos.



I still have a copy of the old
Metabase.xml to prove that it was storing the incorrect settings when IIS MMC
was showing something else..



Let me know if I can ping the screen shots
to you.



Thanks Ken, am I going to get to see you
at Redmond?


C













From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Ken Schaefer
Sent: 21 September 2005 03:17 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Odd.



If you use WFetch (its in the IIS6
Res Kit) or just plain telnet, and request a page, what WWW-Authenticate
headers are coming back? You should see:



WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM



(basically the webserver sends back a list
of the auth mechanisms it supports, and the browser picks the first one in the
list that it supports). If you are only seeing the NTLM option, then
somethings up with IIS or Sharepoint. If you are seeing both, then
AuthDiag is lying to you.



Cheers

Ken













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005
10:39 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Yeah Im not sure about that either at the
moment IIS is REALLY ACTING WEIRD, KEN where are you :P - .



I had the Share Point website in the IIS
MMC specify SPSAppPool (which was a App pool I created) when I checked the
MetaBase.XML file ( you know I love looking at the guts of systemsJ ) it was still
specifying DefaultAppPool (and I mean I had rebooted the server a few times)
also DO NOT RUN: 



Cscript adsutil.vbs set
w3svc/1/ntauthenticationproviders Negotiate,NTLM

Iisreset



I know it seems logical but I KEPT the
quotations in there and what it ended up doing was: Negotiate,NTLM ***Note the
double quotes



And all auth was being
defaulted to Anonymous (thank heavens for a network sniffer J )



Even though I fixed
these issues and I have made sure my Metabase.xml file is correct with
Negotiate,NTLM and with the correct App Pool with the correct
user etc, when I run AuthDiag the only Test Authentication
option I get is NTLM, the Server Settings Node though specifies
Negotiate,NTLM for that Site. 



When I check my ISA
server I STILL see User  Anonymous so I am a bit stumped at the moment
!!!



YEAH it going to be
so cool to meet up with you guys in Redmond
next week J



C











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tony Murray
Sent: 20 September 2005 10:50 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Hi Carlos



As I said, I'm just starting to look at
Kerberos delegation, so take everything I say with a large pinch of salt.
:-)



Anyway, here's the logic I was following.



If I've understood it correctly, you want
the server hosting SharePoint to authenticate to the ISA server as the end
user. Assuming you want to use constrained delegation (which is normal)
then you need to specify the ISA Server somewhere in the configuration, because
you are limiting (constraining)the scope of the delegation to the ISA
Server. If you look at the Delegation tab of an object in ADUC, you will
see the section labeled Services to which this account can present delegated
credentials: It would seem logical to me to have to specify the ISA
here. Now whether you need to do configure this setting in ADUC on the
account being used for the identity of the application pool, or the SharePoint
server itself I don't know.









Cheers





Tony











PS. See you next week :-)











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005
1:38 a.m.
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir

RE: [ActiveDir] Kerberos Delegation

2005-09-22 Thread Roger Seielstad



By default, the IIS app pool and (I believe) sharepoint 
both run under Network Service. Therefore, when Sharepoint makes the request 
outbound, it will be making it within the context of the NetworkService account, 
which means its going to present the server's domain 
credentials.

Roger SeielstadE-mail Geek 



From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Ken 
SchaeferSent: Wednesday, September 21, 2005 11:45 PMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation


Could I ask why hed 
need to do that?

Cheers
Ken






From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Roger 
SeielstadSent: Thursday, 22 
September 2005 4:23 PMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

So have you granted 
domain\IISServer$ access through ISA?


Roger 
SeielstadE-mail Geek 






From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Carlos 
MagalhaesSent: Wednesday, 
September 21, 2005 8:16 AMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation
Well I have some screen 
shots for you of AuthDiag and of wfetch, if you dont mind I can send it to you 
offline.

This is the weird part, 
if I use wfetch to connect using Anonymous as authentication I get the web page 
requested. 

If I specify any other 
auth type i.e. NTLM or Kerberos I get a ISA server page telling me I am not 
authorized to view this page.

With anonymous 
connection I get:
WWW-Authenticate: 
Negotiate
WWW-Authenticate: 
NTLM

With a specified auth 
type I dont get any of that (The screen shots 
explain)

AuthDiag still only 
reports Test Authentication NTLM NO Kerberos.

I still have a copy of 
the old Metabase.xml to prove that it was storing the incorrect settings when 
IIS MMC was showing something else..

Let me know if I can 
ping the screen shots to you.

Thanks Ken, am I going 
to get to see you at Redmond?
C






From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Ken 
SchaeferSent: 21 September 
2005 03:17 PMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Odd.

If you use WFetch (its 
in the IIS6 Res Kit) or just plain telnet, and request a page, what 
WWW-Authenticate headers are coming back? You should 
see:

WWW-Authenticate: 
Negotiate
WWW-Authenticate: 
NTLM

(basically the 
webserver sends back a list of the auth mechanisms it supports, and the browser 
picks the first one in the list that it supports). If you are only seeing the 
NTLM option, then somethings up with IIS or Sharepoint. If you are seeing both, 
then AuthDiag is lying to you.

Cheers
Ken






From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Carlos 
MagalhaesSent: Wednesday, 21 
September 2005 10:39 PMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Yeah Im not sure about 
that either at the moment IIS is REALLY ACTING WEIRD, KEN where are you :P - 
.

I had the Share Point 
website in the IIS MMC specify SPSAppPool (which was a App pool I created) when 
I checked the MetaBase.XML file ( you know I love looking at the guts of 
systemsJ ) it was still 
specifying DefaultAppPool (and I mean I had rebooted the server a few times) 
also DO NOT RUN: 

Cscript adsutil.vbs 
set w3svc/1/ntauthenticationproviders Negotiate,NTLM
Iisreset

I know it seems logical 
but I KEPT the quotations in there and what it ended up doing was: 
Negotiate,NTLM 
***Note the double quotes

And all auth was being 
defaulted to Anonymous (thank heavens for a network sniffer J 
)

Even though I fixed 
these issues and I have made sure my Metabase.xml file is correct with 
Negotiate,NTLM and with the correct App Pool with the correct user etc, 
when I run AuthDiag the only Test Authentication option I get is NTLM, 
the Server Settings Node though specifies Negotiate,NTLM for that Site. 


When I check my ISA 
server I STILL see User  Anonymous so I am a bit stumped at the moment 
!!!

YEAH it going to be 
so cool to meet up with you guys in Redmond next week J

C





From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Tony 
MurraySent: 20 September 2005 
10:50 PMTo: ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Hi 
Carlos

As I said, I'm just 
starting to look at Kerberos delegation, so take everything I say with a large 
pinch of salt. :-)

Anyway, here's the 
logic I was following.

If I've understood it 
correctly, you want the server hosting SharePoint to authenticate to the ISA 
server as the end user. Assuming you want to use constrained delegation 
(which is normal) then you need to specify the ISA Server somewhere in the 
configuration, because you are limiting (constraining)the scope of the 
delegation to the ISA Server. If you look at the Delegation tab of an 
object in ADUC, you will see the section labeled "Services to which this account 
can present delegated credentials:" It would seem logical to 

RE: [ActiveDir] Kerberos Delegation

2005-09-22 Thread Roger Seielstad



I know next to nothing about ISA. The last time I 
touchedit it was still called MS Proxy 2.0I'm assuming there's a 
security group somewhere that is used to control who can do what through the ISA 
server. Actually, I know there is because I'm part of one at work (just don't 
know how to configure it). See my response to Ken as to why this would be 
necessary...

Roger SeielstadE-mail Geek 



From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Carlos 
MagalhaesSent: Thursday, September 22, 2005 2:28 AMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation


Hmmm, explain a little 
more where you would grant this access .

Thanks 

Carlos





From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Roger 
SeielstadSent: 22 September 
2005 08:23 AMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

So have you granted 
domain\IISServer$ access through ISA?


Roger 
SeielstadE-mail Geek 






From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Carlos 
MagalhaesSent: Wednesday, 
September 21, 2005 8:16 AMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation
Well I have some screen 
shots for you of AuthDiag and of wfetch, if you dont mind I can send it to you 
offline.

This is the weird part, 
if I use wfetch to connect using Anonymous as authentication I get the web page 
requested. 

If I specify any other 
auth type i.e. NTLM or Kerberos I get a ISA server page telling me I am not 
authorized to view this page.

With anonymous 
connection I get:
WWW-Authenticate: 
Negotiate
WWW-Authenticate: 
NTLM

With a specified auth 
type I dont get any of that (The screen shots 
explain)

AuthDiag still only 
reports Test Authentication NTLM NO Kerberos.

I still have a copy of 
the old Metabase.xml to prove that it was storing the incorrect settings when 
IIS MMC was showing something else..

Let me know if I can 
ping the screen shots to you.

Thanks Ken, am I going 
to get to see you at Redmond?
C






From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Ken 
SchaeferSent: 21 September 
2005 03:17 PMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Odd.

If you use WFetch (its 
in the IIS6 Res Kit) or just plain telnet, and request a page, what 
WWW-Authenticate headers are coming back? You should 
see:

WWW-Authenticate: 
Negotiate
WWW-Authenticate: 
NTLM

(basically the 
webserver sends back a list of the auth mechanisms it supports, and the browser 
picks the first one in the list that it supports). If you are only seeing the 
NTLM option, then somethings up with IIS or Sharepoint. If you are seeing both, 
then AuthDiag is lying to you.

Cheers
Ken






From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Carlos 
MagalhaesSent: Wednesday, 21 
September 2005 10:39 PMTo: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Yeah Im not sure about 
that either at the moment IIS is REALLY ACTING WEIRD, KEN where are you :P - 
.

I had the Share Point 
website in the IIS MMC specify SPSAppPool (which was a App pool I created) when 
I checked the MetaBase.XML file ( you know I love looking at the guts of 
systemsJ ) it was still 
specifying DefaultAppPool (and I mean I had rebooted the server a few times) 
also DO NOT RUN: 

Cscript adsutil.vbs 
set w3svc/1/ntauthenticationproviders Negotiate,NTLM
Iisreset

I know it seems logical 
but I KEPT the quotations in there and what it ended up doing was: 
Negotiate,NTLM 
***Note the double quotes

And all auth was being 
defaulted to Anonymous (thank heavens for a network sniffer J 
)

Even though I fixed 
these issues and I have made sure my Metabase.xml file is correct with 
Negotiate,NTLM and with the correct App Pool with the correct user etc, 
when I run AuthDiag the only Test Authentication option I get is NTLM, 
the Server Settings Node though specifies Negotiate,NTLM for that Site. 


When I check my ISA 
server I STILL see User  Anonymous so I am a bit stumped at the moment 
!!!

YEAH it going to be 
so cool to meet up with you guys in Redmond next week J

C





From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Tony 
MurraySent: 20 September 2005 
10:50 PMTo: ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Hi 
Carlos

As I said, I'm just 
starting to look at Kerberos delegation, so take everything I say with a large 
pinch of salt. :-)

Anyway, here's the 
logic I was following.

If I've understood it 
correctly, you want the server hosting SharePoint to authenticate to the ISA 
server as the end user. Assuming you want to use constrained delegation 
(which is normal) then you need to specify the ISA Server somewhere in the 
configuration, because you are limiting (constraining)the scope of the 
delegation to the ISA Server. If you look at the Delegation tab of an 
object in ADUC, you will see the section

RE: [ActiveDir] Kerberos Delegation

2005-09-22 Thread Brian Desmond








Sharepoint will unless you ignore the recommendations in the setup wizard
run under a service account you create for it. You can however ignore the
recommendations to make a service account for it when youre setting up
the site/portal app pool and it will run under network service.





Thanks,
Brian
Desmond

[EMAIL PROTECTED]



c -
312.731.3132















From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: Thursday, September 22, 2005
9:57 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





By default, the IIS app pool and (I
believe) sharepoint both run under Network Service. Therefore, when Sharepoint
makes the request outbound, it will be making it within the context of the
NetworkService account, which means its going to present the server's domain
credentials.








Roger Seielstad
E-mail Geek 















From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ken Schaefer
Sent: Wednesday, September 21,
2005 11:45 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation

Could I ask why hed need to do
that?



Cheers

Ken













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: Thursday, 22 September 2005
4:23 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





So have you granted domain\IISServer$
access through ISA?








Roger Seielstad
E-mail Geek 















From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, September 21,
2005 8:16 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation

Well I have some screen shots for you of
AuthDiag and of wfetch, if you dont mind I can send it to you offline.



This is the weird part, if I use wfetch to
connect using Anonymous as authentication I get the web page requested. 



If I specify any other auth type i.e. NTLM
or Kerberos I get a ISA server page telling me I am not authorized to view this
page.



With anonymous connection I get:

WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM



With a specified auth type I dont
get any of that (The screen shots explain)



AuthDiag still only reports Test
Authentication NTLM NO Kerberos.



I still have a copy of the old
Metabase.xml to prove that it was storing the incorrect settings when IIS MMC
was showing something else..



Let me know if I can ping the screen shots
to you.



Thanks Ken, am I going to get to see you
at Redmond?


C













From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Ken Schaefer
Sent: 21 September 2005 03:17 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Odd.



If you use WFetch (its in the IIS6
Res Kit) or just plain telnet, and request a page, what WWW-Authenticate
headers are coming back? You should see:



WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM



(basically the webserver sends back a list
of the auth mechanisms it supports, and the browser picks the first one in the
list that it supports). If you are only seeing the NTLM option, then
somethings up with IIS or Sharepoint. If you are seeing both, then
AuthDiag is lying to you.



Cheers

Ken













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005
10:39 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Yeah Im not sure about that either at the
moment IIS is REALLY ACTING WEIRD, KEN where are you :P - .



I had the Share Point website in the IIS
MMC specify SPSAppPool (which was a App pool I created) when I checked the
MetaBase.XML file ( you know I love looking at the guts of systemsJ ) it was still
specifying DefaultAppPool (and I mean I had rebooted the server a few times)
also DO NOT RUN: 



Cscript adsutil.vbs set
w3svc/1/ntauthenticationproviders Negotiate,NTLM

Iisreset



I know it seems logical but I KEPT the
quotations in there and what it ended up doing was: Negotiate,NTLM ***Note the
double quotes



And all auth was being
defaulted to Anonymous (thank heavens for a network sniffer J )



Even though I fixed
these issues and I have made sure my Metabase.xml file is correct with
Negotiate,NTLM and with the correct App Pool with the correct
user etc, when I run AuthDiag the only Test Authentication
option I get is NTLM, the Server Settings Node though specifies
Negotiate,NTLM for that Site. 



When I check my ISA
server I STILL see User  Anonymous so I am a bit stumped at the moment
!!!



YEAH it going to be
so cool to meet up with you guys in Redmond
next week J



C











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tony Murray
Sent: 20 September 2005 10:50 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Hi Carlos



As I said, I'm just starting to look at
Kerberos delegation, so take

RE: [ActiveDir] Kerberos Delegation

2005-09-22 Thread Carlos Magalhaes
Yup I ignored the setup :) I created a service account for the AppPool in AD 
and set the relevant SPN's for Kerberos delegation, I also enabled that AD 
account for constrained Delegation.
 
Thanks for you input Brian :)
 
C



From: [EMAIL PROTECTED] on behalf of Brian Desmond
Sent: Thu 9/22/2005 4:17 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation



Sharepoint will unless you ignore the recommendations in the setup wizard run 
under a service account you create for it. You can however ignore the 
recommendations to make a service account for it when you're setting up the 
site/portal app pool and it will run under network service.

 

Thanks,
Brian Desmond

[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] 

 

c - 312.731.3132

 

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: Thursday, September 22, 2005 9:57 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

 

By default, the IIS app pool and (I believe) sharepoint both run under Network 
Service. Therefore, when Sharepoint makes the request outbound, it will be 
making it within the context of the NetworkService account, which means its 
going to present the server's domain credentials.

 


Roger Seielstad
E-mail Geek 

 

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ken Schaefer
Sent: Wednesday, September 21, 2005 11:45 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Could I ask why he'd need to do that?

 

Cheers

Ken

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: Thursday, 22 September 2005 4:23 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

 

So have you granted domain\IISServer$ access through ISA?

 


Roger Seielstad
E-mail Geek 

 

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, September 21, 2005 8:16 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Well I have some screen shots for you of AuthDiag and of wfetch, if you don't 
mind I can send it to you offline.

 

This is the weird part, if I use wfetch to connect using Anonymous as 
authentication I get the web page requested. 

 

If I specify any other auth type i.e. NTLM or Kerberos I get a ISA server page 
telling me I am not authorized to view this page.

 

With anonymous connection I get:

WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM

 

With a specified auth type I don't get any of that (The screen shots explain)

 

AuthDiag still only reports Test Authentication NTLM NO Kerberos.

 

I still have a copy of the old Metabase.xml to prove that it was storing the 
incorrect settings when IIS MMC was showing something else.

 

Let me know if I can ping the screen shots to you.

 

Thanks Ken, am I going to get to see you at Redmond?


C

 

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ken Schaefer
Sent: 21 September 2005 03:17 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

 

Odd.

 

If you use WFetch (it's in the IIS6 Res Kit) or just plain telnet, and request 
a page, what WWW-Authenticate headers are coming back? You should see:

 

WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM

 

(basically the webserver sends back a list of the auth mechanisms it supports, 
and the browser picks the first one in the list that it supports). If you are 
only seeing the NTLM option, then something's up with IIS or Sharepoint. If you 
are seeing both, then AuthDiag is lying to you.

 

Cheers

Ken

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005 10:39 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

 

Yeah Im not sure about that either at the moment IIS is REALLY ACTING WEIRD, 
KEN where are you :P - .

 

I had the Share Point website in the IIS MMC specify SPSAppPool (which was a 
App pool I created) when I checked the MetaBase.XML file ( you know I love 
looking at the guts of systems:-) ) it was still specifying DefaultAppPool (and 
I mean I had rebooted the server a few times) also DO NOT RUN: 

 

Cscript adsutil.vbs set w3svc/1/ntauthenticationproviders Negotiate,NTLM

Iisreset

 

I know it seems logical but I KEPT the quotations in there and what it ended up 
doing was: Negotiate,NTLM ***Note the double quotes

 

And all auth was being defaulted to Anonymous (thank heavens for a network 
sniffer :-) )

 

Even though I fixed these issues and I have made sure my Metabase.xml file is 
correct with Negotiate,NTLM and with the correct App Pool

RE: [ActiveDir] Kerberos Delegation

2005-09-22 Thread Carlos Magalhaes
Yes agreed however I have changed the Identity for the SPS AppPool to a service 
account that I have created and registered SPN's, it doesn't seem to be 
accessing ISA with those credentials though I keep see a HTTP request coming 
through with Anonymous as the user.
 
C



From: [EMAIL PROTECTED] on behalf of Roger Seielstad
Sent: Thu 9/22/2005 3:56 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation


By default, the IIS app pool and (I believe) sharepoint both run under Network 
Service. Therefore, when Sharepoint makes the request outbound, it will be 
making it within the context of the NetworkService account, which means its 
going to present the server's domain credentials.
 


Roger Seielstad
E-mail Geek 

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ken Schaefer
Sent: Wednesday, September 21, 2005 11:45 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation



Could I ask why he'd need to do that?

 

Cheers

Ken

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: Thursday, 22 September 2005 4:23 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

 

So have you granted domain\IISServer$ access through ISA?

 


Roger Seielstad
E-mail Geek 

 

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, September 21, 2005 8:16 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Well I have some screen shots for you of AuthDiag and of wfetch, if you don't 
mind I can send it to you offline.

 

This is the weird part, if I use wfetch to connect using Anonymous as 
authentication I get the web page requested. 

 

If I specify any other auth type i.e. NTLM or Kerberos I get a ISA server page 
telling me I am not authorized to view this page.

 

With anonymous connection I get:

WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM

 

With a specified auth type I don't get any of that (The screen shots explain)

 

AuthDiag still only reports Test Authentication NTLM NO Kerberos.

 

I still have a copy of the old Metabase.xml to prove that it was storing the 
incorrect settings when IIS MMC was showing something else.

 

Let me know if I can ping the screen shots to you.

 

Thanks Ken, am I going to get to see you at Redmond?


C

 

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ken Schaefer
Sent: 21 September 2005 03:17 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

 

Odd.

 

If you use WFetch (it's in the IIS6 Res Kit) or just plain telnet, and request 
a page, what WWW-Authenticate headers are coming back? You should see:

 

WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM

 

(basically the webserver sends back a list of the auth mechanisms it supports, 
and the browser picks the first one in the list that it supports). If you are 
only seeing the NTLM option, then something's up with IIS or Sharepoint. If you 
are seeing both, then AuthDiag is lying to you.

 

Cheers

Ken

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005 10:39 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

 

Yeah Im not sure about that either at the moment IIS is REALLY ACTING WEIRD, 
KEN where are you :P - .

 

I had the Share Point website in the IIS MMC specify SPSAppPool (which was a 
App pool I created) when I checked the MetaBase.XML file ( you know I love 
looking at the guts of systems:-) ) it was still specifying DefaultAppPool (and 
I mean I had rebooted the server a few times) also DO NOT RUN: 

 

Cscript adsutil.vbs set w3svc/1/ntauthenticationproviders Negotiate,NTLM

Iisreset

 

I know it seems logical but I KEPT the quotations in there and what it ended up 
doing was: Negotiate,NTLM ***Note the double quotes

 

And all auth was being defaulted to Anonymous (thank heavens for a network 
sniffer :-) )

 

Even though I fixed these issues and I have made sure my Metabase.xml file is 
correct with Negotiate,NTLM and with the correct App Pool with the correct 
user etc,  when I run AuthDiag the only Test Authentication option I get is 
NTLM, the Server Settings Node though specifies Negotiate,NTLM for that Site. 

 

When I check my ISA server I STILL see User - Anonymous so I am a bit stumped 
at the moment !!!

 

YEAH it going to be so cool to meet up with you guys in Redmond next week 
:-)

 

C

 



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tony Murray
Sent: 20 September 2005 10:50 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos

RE: [ActiveDir] Kerberos Delegation

2005-09-22 Thread Ken Schaefer








But isnt the whole point of this
thread to get Delegation working? In that case, the Sharepoint/IIS server
should be connecting to ISA Server as the end user. Or am I missing something
here?



Cheers

Ken













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: Thursday, 22 September 2005
11:57 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





By default, the IIS app
pool and (I believe) sharepoint both run under Network Service. Therefore, when
Sharepoint makes the request outbound, it will be making it within the context
of the NetworkService account, which means its going to present the server's
domain credentials.








Roger Seielstad
E-mail Geek 















From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ken
 Schaefer
Sent: Wednesday, September 21,
2005 11:45 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation

Could I ask why
hed need to do that?



Cheers

Ken













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: Thursday, 22 September 2005
4:23 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





So have you granted
domain\IISServer$ access through ISA?








Roger Seielstad
E-mail Geek 















From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, September 21,
2005 8:16 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation

Well I have some screen
shots for you of AuthDiag and of wfetch, if you dont mind I can send it
to you offline.



This is the weird part,
if I use wfetch to connect using Anonymous as authentication I get the web page
requested. 



If I specify any other
auth type i.e. NTLM or Kerberos I get a ISA server page telling me I am not
authorized to view this page.



With anonymous connection
I get:

WWW-Authenticate:
Negotiate

WWW-Authenticate: NTLM



With a specified auth
type I dont get any of that (The screen shots explain)



AuthDiag still only
reports Test Authentication NTLM NO Kerberos.



I still have a copy of
the old Metabase.xml to prove that it was storing the incorrect settings when
IIS MMC was showing something else..



Let me know if I can ping
the screen shots to you.



Thanks Ken, am I going to
get to see you at Redmond?


C













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ken
 Schaefer
Sent: 21 September 2005 03:17 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Odd.



If you use WFetch
(its in the IIS6 Res Kit) or just plain telnet, and request a page, what
WWW-Authenticate headers are coming back? You should see:



WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM



(basically the webserver
sends back a list of the auth mechanisms it supports, and the browser picks the
first one in the list that it supports). If you are only seeing the NTLM
option, then somethings up with IIS or Sharepoint. If you are seeing
both, then AuthDiag is lying to you.



Cheers

Ken













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005
10:39 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Yeah Im not sure about
that either at the moment IIS is REALLY ACTING WEIRD, KEN where are you :P - .



I had the Share Point
website in the IIS MMC specify SPSAppPool (which was a App pool I created) when
I checked the MetaBase.XML file ( you know I love looking at the guts of
systemsJ ) it was still specifying DefaultAppPool (and I
mean I had rebooted the server a few times) also DO NOT RUN: 



Cscript adsutil.vbs set
w3svc/1/ntauthenticationproviders Negotiate,NTLM

Iisreset



I know it seems logical
but I KEPT the quotations in there and what it ended up doing was: Negotiate,NTLM ***Note the
double quotes



And all auth was being
defaulted to Anonymous (thank heavens for a network sniffer J )



Even though I fixed
these issues and I have made sure my Metabase.xml file is correct with
Negotiate,NTLM and with the correct App Pool with the correct
user etc, when I run AuthDiag the only Test Authentication
option I get is NTLM, the Server Settings Node though specifies
Negotiate,NTLM for that Site. 



When I check my ISA
server I STILL see User  Anonymous so I am a bit stumped at the moment
!!!



YEAH it going to be
so cool to meet up with you guys in Redmond
next week J



C











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tony Murray
Sent: 20 September 2005 10:50 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Hi Carlos



As I said, I'm just starting
to look at Kerberos delegation, so take everything I say with a large pinch of
salt. :-)



Anyway, here's the logic
I was following.



If I've understood it
correctly, you want the server

RE: [ActiveDir] Kerberos Delegation

2005-09-21 Thread Ken Schaefer








Odd.



If you use WFetch (its in the IIS6
Res Kit) or just plain telnet, and request a page, what WWW-Authenticate
headers are coming back? You should see:



WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM



(basically the webserver sends back a list
of the auth mechanisms it supports, and the browser picks the first one in the
list that it supports). If you are only seeing the NTLM option, then somethings
up with IIS or Sharepoint. If you are seeing both, then AuthDiag is lying to
you.



Cheers

Ken













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005
10:39 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Yeah Im not sure about that either at the
moment IIS is REALLY ACTING WEIRD, KEN where are you :P - .



I had the Share Point website in the IIS
MMC specify SPSAppPool (which was a App pool I created) when I checked the MetaBase.XML
file ( you know I love looking at the guts of systemsJ ) it was still
specifying DefaultAppPool (and I mean I had rebooted the server a few times)
also DO NOT RUN: 



Cscript
adsutil.vbs set w3svc/1/ntauthenticationproviders Negotiate,NTLM

Iisreset



I know it seems logical but I KEPT the
quotations in there and what it ended up doing was: Negotiate,NTLM ***Note the
double quotes



And all auth was being
defaulted to Anonymous (thank heavens for a network sniffer J )



Even though I fixed these
issues and I have made sure my Metabase.xml file is correct with
Negotiate,NTLM and with the correct App Pool with the correct
user etc, when I run AuthDiag the only Test Authentication
option I get is NTLM, the Server Settings Node though specifies
Negotiate,NTLM for that Site. 



When I check my ISA
server I STILL see User  Anonymous so I am a bit stumped at the moment
!!!



YEAH it going to be
so cool to meet up with you guys in Redmond
next week J



C











From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Tony Murray
Sent: 20 September 2005 10:50 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Hi Carlos



As I said, I'm just starting to look at
Kerberos delegation, so take everything I say with a large pinch of salt.
:-)



Anyway, here's the logic I was following.



If I've understood it correctly, you want
the server hosting SharePoint to authenticate to the ISA server as the end user.
Assuming you want to use constrained delegation (which is normal) then you need
to specify the ISA Server somewhere in the configuration, because you are
limiting (constraining)the scope of the delegation to the ISA
Server. If you look at the Delegation tab of an object in ADUC, you will
see the section labeled Services to which this account can present
delegated credentials: It would seem logical to me to have to
specify the ISA here. Now whether you need to do configure this setting
in ADUC on the account being used for the identity of the application pool, or
the SharePoint server itself I don't know.









Cheers





Tony











PS. See you next week :-)











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005
1:38 a.m.
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation

Hey Tony,



Well can you explain but wouldn't you also need an SPN for the web service on the
ISA Server? I dont understand why, the ISA server is the
server that is needing the authentication to allow the web server to browse the
internet. 


So to elaborate:



I have a Share Point site it has a RSS
feed web part, this web part is requesting a RSS feed for example http://www.dirteam.com/blogs/carlos/default.aspx
now I monitor on the ISA 2004 server and I see the web server trying to access
the internet the user specified = Anonymous. The delegation is so that the user
viewing the Share Point site (hence calling the RSS web part) will be the user
credentials passed to the ISA server to be able to browse the internet.



Thats why I dont see why we
need to register a SPN for the ISA server?



Thanks
C











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tony Murray
Sent: 20 September 2005 01:17 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Hi Carlos



I'm just starting to look at Kerberos
delegation for something myself,but wouldn't you also need an SPN for the
web service on the ISA Server? And then specify that serviced in the
delegation tab on the user object?



Cheers

Tony









From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Carlos Magalhaes
Sent: Tuesday, 20 September 2005
9:31 a.m.
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Kerberos
Delegation

Hey all,



Ok late at night here and Ive hit a mental block
(dont laugh Dean). I have set this up like a gazillion times but this
time cant get it to work.



Environment: 



Windows

RE: [ActiveDir] Kerberos Delegation

2005-09-21 Thread Carlos Magalhaes








Well I have some screen shots for you of
AuthDiag and of wfetch, if you dont mind I can send it to you offline.



This is the weird part, if I use wfetch to
connect using Anonymous as authentication I get the web page requested. 



If I specify any other auth type i.e. NTLM
or Kerberos I get a ISA server page telling me I am not authorized to view this
page.



With anonymous connection I get:

WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM



With a specified auth type I dont get
any of that (The screen shots explain)



AuthDiag still only reports Test
Authentication NTLM NO Kerberos.



I still have a copy of the old
Metabase.xml to prove that it was storing the incorrect settings when IIS MMC
was showing something else..



Let me know if I can ping the screen shots
to you.



Thanks Ken, am I going to get to see you
at Redmond?


C













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ken Schaefer
Sent: 21 September 2005 03:17 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Odd.



If you use WFetch (its in the IIS6
Res Kit) or just plain telnet, and request a page, what WWW-Authenticate
headers are coming back? You should see:



WWW-Authenticate: Negotiate

WWW-Authenticate: NTLM



(basically the webserver sends back a list
of the auth mechanisms it supports, and the browser picks the first one in the
list that it supports). If you are only seeing the NTLM option, then
somethings up with IIS or Sharepoint. If you are seeing both, then
AuthDiag is lying to you.



Cheers

Ken













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005
10:39 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Yeah Im not sure about that either at the
moment IIS is REALLY ACTING WEIRD, KEN where are you :P - .



I had the Share Point website in the IIS
MMC specify SPSAppPool (which was a App pool I created) when I checked the
MetaBase.XML file ( you know I love looking at the guts of systemsJ ) it was still
specifying DefaultAppPool (and I mean I had rebooted the server a few times)
also DO NOT RUN: 



Cscript
adsutil.vbs set w3svc/1/ntauthenticationproviders Negotiate,NTLM

Iisreset



I know it seems logical but I KEPT the
quotations in there and what it ended up doing was: Negotiate,NTLM ***Note the
double quotes



And all auth was being
defaulted to Anonymous (thank heavens for a network sniffer J )



Even though I fixed
these issues and I have made sure my Metabase.xml file is correct with
Negotiate,NTLM and with the correct App Pool with the correct
user etc, when I run AuthDiag the only Test Authentication
option I get is NTLM, the Server Settings Node though specifies
Negotiate,NTLM for that Site. 



When I check my ISA
server I STILL see User  Anonymous so I am a bit stumped at the moment
!!!



YEAH it going to be
so cool to meet up with you guys in Redmond
next week J



C











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tony Murray
Sent: 20 September 2005 10:50 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Hi Carlos



As I said, I'm just starting to look at
Kerberos delegation, so take everything I say with a large pinch of salt.
:-)



Anyway, here's the logic I was following.



If I've understood it correctly, you want
the server hosting SharePoint to authenticate to the ISA server as the end
user. Assuming you want to use constrained delegation (which is normal)
then you need to specify the ISA Server somewhere in the configuration, because
you are limiting (constraining)the scope of the delegation to the ISA
Server. If you look at the Delegation tab of an object in ADUC, you will
see the section labeled Services to which this account can present
delegated credentials: It would seem logical to me to have to
specify the ISA here. Now whether you need to do configure this setting
in ADUC on the account being used for the identity of the application pool, or
the SharePoint server itself I don't know.









Cheers





Tony











PS. See you next week :-)











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Wednesday, 21 September 2005
1:38 a.m.
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation

Hey Tony,



Well can you explain but wouldn't you also need an SPN for the web service on the
ISA Server? I dont understand why, the ISA server is the
server that is needing the authentication to allow the web server to browse the
internet. 


So to elaborate:



I have a Share Point site it has a RSS
feed web part, this web part is requesting a RSS feed for example http://www.dirteam.com/blogs/carlos/default.aspx
now I monitor on the ISA 2004 server and I see the web server trying to access
the internet the user specified = Anonymous. The delegation is so that the user
viewing the Share

RE: [ActiveDir] Kerberos Delegation

2005-09-20 Thread Carlos Magalhaes








Hey Tony,



Well can you explain but wouldn't you also need an SPN for the web service on the
ISA Server? I dont understand why, the ISA server is the server
that is needing the authentication to allow the web server to browse the
internet. 


So to elaborate:



I have a Share Point site it has a RSS
feed web part, this web part is requesting a RSS feed for example http://www.dirteam.com/blogs/carlos/default.aspx
now I monitor on the ISA 2004 server and I see the web server trying to access
the internet the user specified = Anonymous. The delegation is so that the user
viewing the Share Point site (hence calling the RSS web part) will be the user
credentials passed to the ISA server to be able to browse the internet.



Thats why I dont see why we
need to register a SPN for the ISA server?



Thanks
C











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tony Murray
Sent: 20 September 2005 01:17 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Hi Carlos



I'm just starting to look at Kerberos
delegation for something myself,but wouldn't you also need an SPN for the
web service on the ISA Server? And then specify that serviced in the
delegation tab on the user object?



Cheers

Tony









From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Carlos Magalhaes
Sent: Tuesday, 20 September 2005
9:31 a.m.
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Kerberos
Delegation

Hey all,



Ok late at night here and Ive hit a mental block
(dont laugh Dean). I have set this up like a gazillion times but this
time cant get it to work.



Environment: 



Windows 2003 Native Forest Mode  All clients Windows
XP SP2 and above



Single forest single domain setup



Web Server  Windows Server 2003 Web Edition

Share Point Team Services installed.



That site has a web part that requires Kerb delegation for
access to a ISA firewall in order to stream RSS feeds. I can see on the ISA
server that when ever any user hits the site the HTTP request is sent as
ANONYMOUS.



So what I have done:




 I have
 - Set webserver for delegation (Kerb Only) 
 I have
 - Created username in AD and set for Delegation (Kerb Only) 
 I have
 - Set the Share Point Portal Application Pools (IIS 6.0) to use the
 AD user mentioned above for the Identity of the App Pool (rebooted IIS
 server) 


a. Purged all
tickets as well.


 I have - registerd a SPN for
 the -A HTTP DOMAIN\User mentioned Above 




Still get Anonymous access on the ISA box, and using some
normal .net code can see that its not delegating the creds correctly, can
anyone see what I am doing wrong or what I should be doing?


Thanks I appreciate the help so late in my night J



Carlos







This e-mail message has been scanned for Viruses and Content and
cleared by NetIQ MailMarshal at Gen-i















RE: [ActiveDir] Kerberos Delegation

2005-09-20 Thread Tony Murray



Hi Carlos

As I said, I'm just starting to look at Kerberos 
delegation, so take everything I say with a large pinch of salt. 
:-)

Anyway, here's the logic I was 
following.

If I've understood it correctly, you want the server 
hosting SharePoint to authenticate to the ISA server as the end user. 
Assuming you want to use constrained delegation (which is normal) then you need 
to specify the ISA Server somewhere in the configuration, because you are 
limiting (constraining)the scope of the delegation to the ISA 
Server. If you look at the Delegation tab of an object in ADUC, you will 
see the section labeled "Services to which this account can present delegated 
credentials:" It would seem logical to me to have to specify the ISA 
here. Now whether you need to do configure this setting in ADUC on the 
account being used for the identity of the application pool, or the SharePoint 
server itself I don't know.

Cheers
Tony

PS. See you next week :-)



From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Carlos 
MagalhaesSent: Wednesday, 21 September 2005 1:38 a.m.To: 
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation


Hey 
Tony,

Well can you explain 
but wouldn't you also 
need an SPN for the web service on the ISA Server? I dont understand 
why, the ISA server is the server that is needing the authentication to allow 
the web server to browse the internet. 
So to 
elaborate:

I have a Share Point 
site it has a RSS feed web part, this web part is requesting a RSS feed for 
example http://www.dirteam.com/blogs/carlos/default.aspx 
now I monitor on the ISA 2004 server and I see the web server trying to access 
the internet the user specified = Anonymous. The delegation is so that the user 
viewing the Share Point site (hence calling the RSS web part) will be the user 
credentials passed to the ISA server to be able to browse the 
internet.

Thats why I dont see 
why we need to register a SPN for the ISA server?

ThanksC





From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Tony 
MurraySent: 20 September 2005 
01:17 AMTo: ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos 
Delegation

Hi 
Carlos

I'm just starting to 
look at Kerberos delegation for something myself,but wouldn't you also 
need an SPN for the web service on the ISA Server? And then specify that 
serviced in the delegation tab on the user object?

Cheers
Tony




From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Carlos 
MagalhaesSent: Tuesday, 20 
September 2005 9:31 a.m.To: 
ActiveDir@mail.activedir.orgSubject: [ActiveDir] Kerberos 
Delegation
Hey 
all,

Ok late at night here and Ive hit a 
mental block (dont laugh Dean). I have set this up like a gazillion times but 
this time cant get it to work.

Environment: 


Windows 2003 Native Forest Mode  
All clients Windows XP SP2 and above

Single forest single domain 
setup

Web Server  Windows Server 2003 Web 
Edition
Share Point Team Services 
installed.

That site has a web part that 
requires Kerb delegation for access to a ISA firewall in order to stream RSS 
feeds. I can see on the ISA server that when ever any user hits the site the 
HTTP request is sent as ANONYMOUS.

So what I have 
done:


  I have - Set 
  webserver for delegation (Kerb Only) 
  I have - Created 
  username in AD and set for Delegation (Kerb Only) 
  I have - Set the 
  Share Point Portal Application Pools (IIS 6.0) to use the AD user 
  mentioned above for the Identity of the App Pool (rebooted IIS 
  server) 
a. Purged all 
tickets as well.

  I have - registerd a 
  SPN for the -A HTTP DOMAIN\User mentioned Above 

Still get Anonymous access on the 
ISA box, and using some normal .net code can see that its not delegating the 
creds correctly, can anyone see what I am doing wrong or what I should be 
doing?
Thanks I appreciate the help so 
late in my night J

Carlos



This e-mail message has been scanned for Viruses and 
Content and cleared by NetIQ MailMarshal 
at Gen-i 





This e-mail message has been scanned for Viruses and Content and cleared by 
NetIQ MailMarshal at Gen-i 




[ActiveDir] Kerberos Delegation

2005-09-19 Thread Carlos Magalhaes








Hey all,



Ok late at night here and Ive hit a mental block (dont
laugh Dean). I have set this up like a gazillion times but this time cant get
it to work.



Environment: 



Windows 2003 Native Forest Mode  All clients Windows
XP SP2 and above



Single forest single domain setup



Web Server  Windows Server 2003 Web Edition

Share Point Team Services installed.



That site has a web part that requires Kerb delegation for
access to a ISA firewall in order to stream RSS feeds. I can see on the ISA
server that when ever any user hits the site the HTTP request is sent as
ANONYMOUS.



So what I have done:




 I have - Set webserver for delegation (Kerb Only)
 I have - Created username in AD and set for Delegation
 (Kerb Only)
 I have - Set the Share Point Portal Application Pools
 (IIS 6.0) to use the AD user mentioned above for the Identity of the App
 Pool (rebooted IIS server)


a.
Purged all tickets as well.


 I have - registerd a SPN for
 the -A HTTP DOMAIN\User mentioned Above




Still get Anonymous access on the ISA box, and using some
normal .net code can see that its not delegating the creds correctly, can
anyone see what I am doing wrong or what I should be doing?


Thanks I appreciate the help so late in my night J



Carlos








RE: [ActiveDir] Kerberos Delegation

2005-09-19 Thread Tony Murray



Hi Carlos

I'm just starting to look at Kerberos delegation for 
something myself,but wouldn't you also need an SPN for the web service 
on the ISA Server? And then specify that serviced in the delegation tab on 
the user object?

Cheers
Tony




From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Carlos MagalhaesSent: Tuesday, 20 September 2005 
9:31 a.m.To: ActiveDir@mail.activedir.orgSubject: 
[ActiveDir] Kerberos Delegation


Hey 
all,

Ok late at night here and Ive hit a 
mental block (dont laugh Dean). I have set this up like a gazillion times but 
this time cant get it to work.

Environment: 


Windows 2003 Native Forest Mode  
All clients Windows XP SP2 and above

Single forest single domain 
setup

Web Server  Windows Server 2003 Web 
Edition
Share Point Team Services 
installed.

That site has a web part that 
requires Kerb delegation for access to a ISA firewall in order to stream RSS 
feeds. I can see on the ISA server that when ever any user hits the site the 
HTTP request is sent as ANONYMOUS.

So what I have 
done:


  I have - Set 
  webserver for delegation (Kerb Only) 
  I have - Created 
  username in AD and set for Delegation (Kerb Only) 
  I have - Set the 
  Share Point Portal Application Pools (IIS 6.0) to use the AD user 
  mentioned above for the Identity of the App Pool (rebooted IIS 
  server) 
a. 
Purged all tickets as 
well.

  I have - registerd a 
  SPN for the -A HTTP DOMAIN\User mentioned Above 


Still get Anonymous access on the 
ISA box, and using some normal .net code can see that its not delegating the 
creds correctly, can anyone see what I am doing wrong or what I should be 
doing?
Thanks I appreciate the help so 
late in my night J

Carlos

This e-mail message has been scanned for Viruses and Content and cleared by 
NetIQ MailMarshal at Gen-i 




RE: [ActiveDir] Kerberos Delegation

2005-09-19 Thread frank . carroll



Carlos,

If I understand the situation correctly you are going 
client - Sharepoint IIS server - ISA server. It sounds like you need to 
pass the client's kerberos credentials all the way to the ISA box. If that is 
correct, here is what I would try...

Client Browser: IE6SP1 will not negotiate kerberos by 
default. You need to set the integrated authentication value as detailed in 
KB299838.

Sharepoint IIS Server: The default Sharepoint install 
disables kerberos by default (see KB823265 - this is an exchange article but it 
documents the default sharepoint install behavior). See KB832769 for directions 
on how to enable kerberos for sharepoint. We did the following to allow the 
default website to use kerberos:


Cscript adsutil.vbs set w3svc/1/ntauthenticationproviders 
Negotiate,NTLM
Iisreset

Next, setup the application pool service account to permit 
delegation (ADUC) "account is trusted for delegation"

After this, you need to add an SPN to the service account 
that you setup to run the application pool:


Setspn A HTTP/fqdnofyourserveryourdomain\youraccount

At this point your 
client should negotiate kerberos when it connects to the SPS server. You can 
verify this with kerbtray from the resource kit. You should see a ticket for the 
application pool service account.

If you connect to the SPS site by any other URLs other 
than the FQDN (i.e. the netbios name of the server or some other internal 
namespace URL - sps.app.local, etc) you will need to add additional SPNs to the 
application pool service account:


Setspn A HTTP/netbiosservernameyourdomain\youraccount
Setspn A HTTP/sps.app.localyourdomain\youraccount

Again, after you do this you shold be able to access 
the site by any of the three URLs (server FQDN, server netbios, other namespace 
URL) and see the ticket for the application pool service account in 
kerbtray.

In my case the sharepoint server was the endpoint of 
the connection trailbut once you get to the SPS server with kerberos you 
should be able to hop again to the ISA box.

Hope this helps - it may be a repeat of what you have 
already done. This is an extract of the doc that I wrote for myself when I had 
to figure this out. You amy also want to take a peek at the ISA box to see if 
the ISA install also turned off Kerberos. I don't know about this one because I 
have never had to look at that one...

Frank




From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Carlos 
MagalhaesSent: Monday, September 19, 2005 5:31 PMTo: 
ActiveDir@mail.activedir.orgSubject: [ActiveDir] Kerberos 
Delegation


Hey 
all,

Ok late at night here and Ive hit a 
mental block (dont laugh Dean). I have set this up like a gazillion times but 
this time cant get it to work.

Environment: 


Windows 2003 Native Forest Mode  
All clients Windows XP SP2 and above

Single forest single domain 
setup

Web Server  Windows Server 2003 Web 
Edition
Share Point Team Services 
installed.

That site has a web part that 
requires Kerb delegation for access to a ISA firewall in order to stream RSS 
feeds. I can see on the ISA server that when ever any user hits the site the 
HTTP request is sent as ANONYMOUS.

So what I have 
done:


  I have - Set 
  webserver for delegation (Kerb Only) 
  I have - Created 
  username in AD and set for Delegation (Kerb Only) 
  I have - Set the 
  Share Point Portal Application Pools (IIS 6.0) to use the AD user 
  mentioned above for the Identity of the App Pool (rebooted IIS 
  server) 
a. 
Purged all tickets as 
well.

  I have - registerd a 
  SPN for the -A HTTP DOMAIN\User mentioned Above 


Still get Anonymous access on the 
ISA box, and using some normal .net code can see that its not delegating the 
creds correctly, can anyone see what I am doing wrong or what I should be 
doing?
Thanks I appreciate the help so 
late in my night J

Carlos


RE: [ActiveDir] Kerberos Delegation

2005-09-19 Thread Ken Schaefer








One addition: IE will not attempt to
negotiate Kerberos Auth if is the site is in the Internet Security Zone (which
sites accessed by FQDN are by default). Add the site to the local Intranet
zone.



Some other thoughts: If NTLM is not
desired (i.e. Kerberos only), then you can set the Auth Providers key to Negotiate
only, rather than Negotiate,NTLM. That will stop IE from using
NTLM

KB299838 only applies to IE5 upgraded to
IE6 AFAIK, so if you have, say, Windows XP that comes OOB with IE6, then the
checkbox mentioned is already checked (by default).



Lastly, if Kerberos isnt an option
(e.g. users out on the Internet), then if you have a Windows 2003 Domain,
Protocol Transition may be a possibility (but Ive never set that up on a
Sharepoint box, so I cant say with 100% certainty that itll work):
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/security/constdel.mspx



But in OPs case, I think the first
thing to check is the Auth Providers key, since Sharepoint does set that to
NTLM by default (as mentioned below)



Cheers

Ken













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED]
Sent: Tuesday, 20 September 2005
12:26 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos
Delegation





Carlos,



If I understand the situation correctly
you are going client - Sharepoint IIS server - ISA server. It sounds
like you need to pass the client's kerberos credentials all the way to the ISA
box. If that is correct, here is what I would try...



Client Browser: IE6SP1 will not negotiate
kerberos by default. You need to set the integrated authentication value as
detailed in KB299838.



Sharepoint IIS Server: The default
Sharepoint install disables kerberos by default (see KB823265 - this is an
exchange article but it documents the default sharepoint install behavior). See
KB832769 for directions on how to enable kerberos for sharepoint. We did the
following to allow the default website to use kerberos:



Cscript adsutil.vbs set
w3svc/1/ntauthenticationproviders Negotiate,NTLM

Iisreset



Next, setup the application pool service
account to permit delegation (ADUC) account is trusted for
delegation



After this, you need to add an SPN to the
service account that you setup to run the application pool:



Setspn A
HTTP/fqdnofyourserveryourdomain\youraccount









At this point your client should negotiate
kerberos when it connects to the SPS server. You can verify this with kerbtray
from the resource kit. You should see a ticket for the application pool service
account.











If you connect to the SPS site by any
other URLs other than the FQDN (i.e. the netbios name of the server or some
other internal namespace URL - sps.app.local, etc) you will need to add
additional SPNs to the application pool service account:











Setspn A
HTTP/netbiosservernameyourdomain\youraccount

Setspn A
HTTP/sps.app.localyourdomain\youraccount











Again, after you do this you shold be able
to access the site by any of the three URLs (server FQDN, server netbios, other
namespace URL) and see the ticket for the application pool service account in
kerbtray.











In my case the sharepoint server was the
endpoint of the connection trailbut once you get to the SPS server with
kerberos you should be able to hop again to the ISA box.











Hope this helps - it may be a repeat of
what you have already done. This is an extract of the doc that I wrote for
myself when I had to figure this out. You amy also want to take a peek at the
ISA box to see if the ISA install also turned off Kerberos. I don't know about
this one because I have never had to look at that one...











Frank





















From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Carlos Magalhaes
Sent: Monday, September 19, 2005
5:31 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Kerberos
Delegation

Hey all,



Ok late at night here and Ive hit a mental block
(dont laugh Dean). I have set this up like a gazillion times but this
time cant get it to work.



Environment: 



Windows 2003 Native Forest Mode  All clients Windows
XP SP2 and above



Single forest single domain setup



Web Server  Windows Server 2003 Web Edition

Share Point Team Services installed.



That site has a web part that requires Kerb delegation for
access to a ISA firewall in order to stream RSS feeds. I can see on the ISA
server that when ever any user hits the site the HTTP request is sent as
ANONYMOUS.



So what I have done:




 I have
 - Set webserver for delegation (Kerb Only) 
 I have
 - Created username in AD and set for Delegation (Kerb Only) 
 I have
 - Set the Share Point Portal Application Pools (IIS 6.0) to use the
 AD user mentioned above for the Identity of the App Pool (rebooted IIS
 server) 


a. Purged all
tickets as well.


 I have - registerd a SPN for
 the -A HTTP DOMAIN\User mentioned Above 




Still get

[ActiveDir] Kerberos Delegation

2005-08-09 Thread Free, Bob
We have a developer who wants us to allow delegation for a couple of SQL
servers and their service accounts so he can do distributed queries
across linked servers. This is new ground for us from an AD perspective
that I have just started researching and I'd like to hear other's
thoughts, policies etc.

We are at 2003 functional level so from what I read, we can allow
constrained delegation which is much better than un-constrained but most
of the comments I come across indicate this isn't something to be taken
lightly, has serious security ramifications, policies should be in place
etc etc..

I can find a reasonable amount of information from the developers
point-of-view, and I can see how to implement it technically (I think)
but not a whole lot from the AD admin's perspective, especially as it
pertains to the desirability of allowing it and how best to manage it if
it is allowed.

Any info greatly appreciated.

Bob

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


RE: [ActiveDir] Kerberos Delegation

2005-08-09 Thread Bernard, Aric
Assuming that you are aware of what constrained delegation is, how it
operates, and what it should be used for...

Anytime you allow someone or something to impersonate, err, act on
behalf of another security principal, there is always cause for concern.
Constrained delegation certainly provides some flexibility in achieving
this goal and fulfilling the applications need, but like any Domain
Admin in your forest the developer and the application must be trusted.

I would recommend clear documentation as to the architecture of the
application, how and with what other systems it interoperates, and if
you have the wherewithal (or can bring in someone who does) a code
review to ensure that what is defined is accurate.  

I know this seems a little over-the-top, but we are taking about you
accepting someone else walking around with my ID and saying he told me
it was OK that I access fill in the blank on his behalf.

Regards,

Aric Bernard

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
Sent: Tuesday, August 09, 2005 1:07 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Kerberos Delegation

We have a developer who wants us to allow delegation for a couple of SQL
servers and their service accounts so he can do distributed queries
across linked servers. This is new ground for us from an AD perspective
that I have just started researching and I'd like to hear other's
thoughts, policies etc.

We are at 2003 functional level so from what I read, we can allow
constrained delegation which is much better than un-constrained but most
of the comments I come across indicate this isn't something to be taken
lightly, has serious security ramifications, policies should be in place
etc etc..

I can find a reasonable amount of information from the developers
point-of-view, and I can see how to implement it technically (I think)
but not a whole lot from the AD admin's perspective, especially as it
pertains to the desirability of allowing it and how best to manage it if
it is allowed.

Any info greatly appreciated.

Bob

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/
List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


RE: [ActiveDir] Kerberos Delegation

2005-08-09 Thread Rick Kingslan
Bob,

Make no mistake - I'm really not a fan of allowing Act as part of the
operating system or the Impersonation privilege.

That being said - from the work that I have done with other web developers
needing access to SQL or application servers, constrained delegation is the
best method that I have seen available - IF it is done correctly.  As I
suspect you know (and the reason for your asking) it' all about the level of
comfort with the solution.

However, just the very configuration sets up two things that I like very
much.  One - in the old(er)methods of delegation, Alice authNs to server
Bob, which then impersonates Alice to SQL Server.  Bob is then the
authenticator to the destination, SQL Server - not Alice, which causes a bit
of problem - Trust.  Can you trust Server Bob, or the administrator, or who
else might have control of server Bob?  Maybe not.  Auditing, too, becomes a
problem.

Model two involves, again Alice AuthN to Server Bob, Server Bob authNs to
the SQL server as Alice.  Server Bob, in and of itself has no permissions to
the SQL server and we see that the audit logs show access by Alice - not
Bob.  Big mitigation in relation to authN.  Alice is allowed, not Server
Bob.  Server Bob is still allowed to do some role based authN and authZ.

Now, let's add the constrained delegation.  Pretty much the same thing as
model two - except we are allowed to limit the scope of servers, services,
ports, etc. that the delegated request is able to talk to.

There is no completely safe solution when we involve impersonation.
However, Security is Risk Management.  Without having a complete, holistic
view of the entire solution and environment, I can't really tell you what
your risk will be.  What I can say is that if Plain Text is 100% Risk, and
Act As Operating System is 30%, this is 10%.

As to the AD perspective - not much at all that I'm aware of.  As to the
desirability, I'd prefer this method over any of the others that have been
presented of late - short of two-factor.

If you haven't seen this:

http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/
security/constdel.mspx


Rick

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
Sent: Tuesday, August 09, 2005 3:07 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Kerberos Delegation

We have a developer who wants us to allow delegation for a couple of SQL
servers and their service accounts so he can do distributed queries
across linked servers. This is new ground for us from an AD perspective
that I have just started researching and I'd like to hear other's
thoughts, policies etc.

We are at 2003 functional level so from what I read, we can allow
constrained delegation which is much better than un-constrained but most
of the comments I come across indicate this isn't something to be taken
lightly, has serious security ramifications, policies should be in place
etc etc..

I can find a reasonable amount of information from the developers
point-of-view, and I can see how to implement it technically (I think)
but not a whole lot from the AD admin's perspective, especially as it
pertains to the desirability of allowing it and how best to manage it if
it is allowed.

Any info greatly appreciated.

Bob

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


RE: [ActiveDir] Kerberos Delegation

2005-08-09 Thread joseph.e.kaplan
Do you have details on the accounts that will be delegated?  With
constrained delegation, it is pretty straightforward to limit which
accounts can delegate to which other services, but you might want to be
very careful about limiting who gets delegated.

One really good idea is marking all the domain admin accounts as
sensitive and cannot be delegated for example.  From there, you might
also consider adding additional accounts.

From a business perspective, a lot of times implementing a delegation
scenario is much preferable to the alternatives.  Here, the dev would
probably have to hit the other SQL boxes with a service account and
would lose the ability to enforce the same security model in place with
SQL which is not good.

My $0.02,

Joe K.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
Sent: Tuesday, August 09, 2005 3:07 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Kerberos Delegation

We have a developer who wants us to allow delegation for a couple of SQL
servers and their service accounts so he can do distributed queries
across linked servers. This is new ground for us from an AD perspective
that I have just started researching and I'd like to hear other's
thoughts, policies etc.

We are at 2003 functional level so from what I read, we can allow
constrained delegation which is much better than un-constrained but most
of the comments I come across indicate this isn't something to be taken
lightly, has serious security ramifications, policies should be in place
etc etc..

I can find a reasonable amount of information from the developers
point-of-view, and I can see how to implement it technically (I think)
but not a whole lot from the AD admin's perspective, especially as it
pertains to the desirability of allowing it and how best to manage it if
it is allowed.

Any info greatly appreciated.

Bob

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/


This message is for the designated recipient only and may contain privileged, 
proprietary, or otherwise private information.  If you have received it in 
error, please notify the sender immediately and delete the original.  Any other 
use of the email by you is prohibited.
List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


RE: [ActiveDir] Kerberos Delegation

2005-08-09 Thread Free, Bob
 Assuming that you are aware of what constrained delegation is, how it
operates, and what it should be used for...

That's the point of my query, I certainly don't understand all I know
about it and we have never allowed it, at this point I have just begun
to scratch the surface. I was totally uncomfortable when it was first
proposed and threw up the stop sign. I'm getting less comfortable by the
minute as I read more about it. 

I'm reading the Kerberos Protocol Transition and Constrained Delegation
article and the Troubleshooting Kerberos Delegation white paper and like
I said, trying to understand all I know about it ;-(

Everyone's comments so far are immensely appreciated.

Thanks

Bob

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Bernard, Aric
Sent: Tuesday, August 09, 2005 1:38 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Assuming that you are aware of what constrained delegation is, how it
operates, and what it should be used for...

Anytime you allow someone or something to impersonate, err, act on
behalf of another security principal, there is always cause for concern.
Constrained delegation certainly provides some flexibility in achieving
this goal and fulfilling the applications need, but like any Domain
Admin in your forest the developer and the application must be trusted.

I would recommend clear documentation as to the architecture of the
application, how and with what other systems it interoperates, and if
you have the wherewithal (or can bring in someone who does) a code
review to ensure that what is defined is accurate.  

I know this seems a little over-the-top, but we are taking about you
accepting someone else walking around with my ID and saying he told me
it was OK that I access fill in the blank on his behalf.

Regards,

Aric Bernard

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
Sent: Tuesday, August 09, 2005 1:07 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Kerberos Delegation

We have a developer who wants us to allow delegation for a couple of SQL
servers and their service accounts so he can do distributed queries
across linked servers. This is new ground for us from an AD perspective
that I have just started researching and I'd like to hear other's
thoughts, policies etc.

We are at 2003 functional level so from what I read, we can allow
constrained delegation which is much better than un-constrained but most
of the comments I come across indicate this isn't something to be taken
lightly, has serious security ramifications, policies should be in place
etc etc..

I can find a reasonable amount of information from the developers
point-of-view, and I can see how to implement it technically (I think)
but not a whole lot from the AD admin's perspective, especially as it
pertains to the desirability of allowing it and how best to manage it if
it is allowed.

Any info greatly appreciated.

Bob

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/
List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


RE: [ActiveDir] Kerberos Delegation

2005-08-09 Thread joseph.e.kaplan
Rick, I agree with your points on CD, but what are you talking about
here with Act as part of the operating system?  That doesn't need to
get enabled anywhere to use constrained delegation.

Generally, that only tends to get added to accounts on Windows 2000 that
need to call the LogonUser API, but it is not needed for that on XP or
2003.

The other reason is it sometimes needs is when a process wants to
directly create a security token for a user with impersonation
privileges via Kerberos S4U (protocol transition).  However, this is not
normally the case unless protocol transition is being done
programmatically.  The automatic version of protocol transition
doesn't need this.

If you were just using that as an example of a bad setting choice to
have to make, then I get it.  I just wanted to make sure there was no
cross up.

Thanks!

Joe K.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Rick Kingslan
Sent: Tuesday, August 09, 2005 4:00 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Bob,

Make no mistake - I'm really not a fan of allowing Act as part of the
operating system or the Impersonation privilege.

That being said - from the work that I have done with other web
developers
needing access to SQL or application servers, constrained delegation is
the
best method that I have seen available - IF it is done correctly.  As I
suspect you know (and the reason for your asking) it' all about the
level of
comfort with the solution.

However, just the very configuration sets up two things that I like very
much.  One - in the old(er)methods of delegation, Alice authNs to server
Bob, which then impersonates Alice to SQL Server.  Bob is then the
authenticator to the destination, SQL Server - not Alice, which causes a
bit
of problem - Trust.  Can you trust Server Bob, or the administrator, or
who
else might have control of server Bob?  Maybe not.  Auditing, too,
becomes a
problem.

Model two involves, again Alice AuthN to Server Bob, Server Bob authNs
to
the SQL server as Alice.  Server Bob, in and of itself has no
permissions to
the SQL server and we see that the audit logs show access by Alice - not
Bob.  Big mitigation in relation to authN.  Alice is allowed, not Server
Bob.  Server Bob is still allowed to do some role based authN and authZ.

Now, let's add the constrained delegation.  Pretty much the same thing
as
model two - except we are allowed to limit the scope of servers,
services,
ports, etc. that the delegated request is able to talk to.

There is no completely safe solution when we involve impersonation.
However, Security is Risk Management.  Without having a complete,
holistic
view of the entire solution and environment, I can't really tell you
what
your risk will be.  What I can say is that if Plain Text is 100% Risk,
and
Act As Operating System is 30%, this is 10%.

As to the AD perspective - not much at all that I'm aware of.  As to the
desirability, I'd prefer this method over any of the others that have
been
presented of late - short of two-factor.

If you haven't seen this:

http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technolog
ies/
security/constdel.mspx


Rick

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
Sent: Tuesday, August 09, 2005 3:07 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Kerberos Delegation

We have a developer who wants us to allow delegation for a couple of SQL
servers and their service accounts so he can do distributed queries
across linked servers. This is new ground for us from an AD perspective
that I have just started researching and I'd like to hear other's
thoughts, policies etc.

We are at 2003 functional level so from what I read, we can allow
constrained delegation which is much better than un-constrained but most
of the comments I come across indicate this isn't something to be taken
lightly, has serious security ramifications, policies should be in place
etc etc..

I can find a reasonable amount of information from the developers
point-of-view, and I can see how to implement it technically (I think)
but not a whole lot from the AD admin's perspective, especially as it
pertains to the desirability of allowing it and how best to manage it if
it is allowed.

Any info greatly appreciated.

Bob

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/


This message is for the designated recipient only and may contain privileged, 
proprietary, or otherwise private information.  If you have received it in 
error, please notify the sender immediately and delete the original.  Any other 
use of the email by you is prohibited

RE: [ActiveDir] Kerberos Delegation

2005-08-09 Thread Bernard, Aric
Bob,

As Rick and Joe mentioned, as far as allowing a system to do something
on behalf of a user, constrained delegation is a pretty good solution.
Your developers need as I understand it is as follows:

User connects to a front application server (i.e. web server) and
authenticates to that server using Kerberos.  The application needs to
be able to contact multiple different SQL servers to perform a
distributed query.  If the application where to do with a service
account, the response to the query would likely contain all of the
information that the service account had that matched the query - this
might contain more or less information than the user making the request
has access to.  In addition the audit trail on the SQL server should
reflect that the application server made the access to the SQL server as
opposed to the user.

Using constrained delegation, the application server is provided the
capability to act as the user when interacting with the identified SQL
servers (only).  If done properly, the application server will be
delegated in a manner that explicitly identifies the SQL servers Service
Principal names (which include port numbers) associated with each SQL
computers object in the directory.  Therefore the application server CAN
impersonate the user but under the constraint that it may only occur
when communicating with the remote server/service/port as named in the
delegation.

In your case the risk should be relatively low so long as your developer
has a vested interest in the integrity of the data on the SQL servers.
The only abuse of this specific configuration that I can think off the
top of my head would be possibility for the developer to execute a
stored procedure on the SQL server with more rights than he or she would
typically have thereby gaining access to or altering data in the DB that
they would otherwise not have access to.

Now if your developer starts asking for constrained delegation from the
application server to a DC, we should talk some more. :)

Regards,

Aric


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
Sent: Tuesday, August 09, 2005 2:33 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

 Assuming that you are aware of what constrained delegation is, how it
operates, and what it should be used for...

That's the point of my query, I certainly don't understand all I know
about it and we have never allowed it, at this point I have just begun
to scratch the surface. I was totally uncomfortable when it was first
proposed and threw up the stop sign. I'm getting less comfortable by the
minute as I read more about it. 

I'm reading the Kerberos Protocol Transition and Constrained Delegation
article and the Troubleshooting Kerberos Delegation white paper and like
I said, trying to understand all I know about it ;-(

Everyone's comments so far are immensely appreciated.

Thanks

Bob

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Bernard, Aric
Sent: Tuesday, August 09, 2005 1:38 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Assuming that you are aware of what constrained delegation is, how it
operates, and what it should be used for...

Anytime you allow someone or something to impersonate, err, act on
behalf of another security principal, there is always cause for concern.
Constrained delegation certainly provides some flexibility in achieving
this goal and fulfilling the applications need, but like any Domain
Admin in your forest the developer and the application must be trusted.

I would recommend clear documentation as to the architecture of the
application, how and with what other systems it interoperates, and if
you have the wherewithal (or can bring in someone who does) a code
review to ensure that what is defined is accurate.  

I know this seems a little over-the-top, but we are taking about you
accepting someone else walking around with my ID and saying he told me
it was OK that I access fill in the blank on his behalf.

Regards,

Aric Bernard

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
Sent: Tuesday, August 09, 2005 1:07 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Kerberos Delegation

We have a developer who wants us to allow delegation for a couple of SQL
servers and their service accounts so he can do distributed queries
across linked servers. This is new ground for us from an AD perspective
that I have just started researching and I'd like to hear other's
thoughts, policies etc.

We are at 2003 functional level so from what I read, we can allow
constrained delegation which is much better than un-constrained but most
of the comments I come across indicate this isn't something to be taken
lightly, has serious security ramifications, policies should be in place
etc etc..

I can find a reasonable amount of information from

RE: [ActiveDir] Kerberos Delegation

2005-08-09 Thread Rick Kingslan
Correct - we're on the same page.  Simply an example of things that I don't
like that have been used in the past to allow systems to act upon another by
issuing token-based methods.

Rick

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Tuesday, August 09, 2005 4:30 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Rick, I agree with your points on CD, but what are you talking about
here with Act as part of the operating system?  That doesn't need to
get enabled anywhere to use constrained delegation.

Generally, that only tends to get added to accounts on Windows 2000 that
need to call the LogonUser API, but it is not needed for that on XP or
2003.

The other reason is it sometimes needs is when a process wants to
directly create a security token for a user with impersonation
privileges via Kerberos S4U (protocol transition).  However, this is not
normally the case unless protocol transition is being done
programmatically.  The automatic version of protocol transition
doesn't need this.

If you were just using that as an example of a bad setting choice to
have to make, then I get it.  I just wanted to make sure there was no
cross up.

Thanks!

Joe K.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Rick Kingslan
Sent: Tuesday, August 09, 2005 4:00 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Bob,

Make no mistake - I'm really not a fan of allowing Act as part of the
operating system or the Impersonation privilege.

That being said - from the work that I have done with other web
developers
needing access to SQL or application servers, constrained delegation is
the
best method that I have seen available - IF it is done correctly.  As I
suspect you know (and the reason for your asking) it' all about the
level of
comfort with the solution.

However, just the very configuration sets up two things that I like very
much.  One - in the old(er)methods of delegation, Alice authNs to server
Bob, which then impersonates Alice to SQL Server.  Bob is then the
authenticator to the destination, SQL Server - not Alice, which causes a
bit
of problem - Trust.  Can you trust Server Bob, or the administrator, or
who
else might have control of server Bob?  Maybe not.  Auditing, too,
becomes a
problem.

Model two involves, again Alice AuthN to Server Bob, Server Bob authNs
to
the SQL server as Alice.  Server Bob, in and of itself has no
permissions to
the SQL server and we see that the audit logs show access by Alice - not
Bob.  Big mitigation in relation to authN.  Alice is allowed, not Server
Bob.  Server Bob is still allowed to do some role based authN and authZ.

Now, let's add the constrained delegation.  Pretty much the same thing
as
model two - except we are allowed to limit the scope of servers,
services,
ports, etc. that the delegated request is able to talk to.

There is no completely safe solution when we involve impersonation.
However, Security is Risk Management.  Without having a complete,
holistic
view of the entire solution and environment, I can't really tell you
what
your risk will be.  What I can say is that if Plain Text is 100% Risk,
and
Act As Operating System is 30%, this is 10%.

As to the AD perspective - not much at all that I'm aware of.  As to the
desirability, I'd prefer this method over any of the others that have
been
presented of late - short of two-factor.

If you haven't seen this:

http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technolog
ies/
security/constdel.mspx


Rick

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
Sent: Tuesday, August 09, 2005 3:07 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Kerberos Delegation

We have a developer who wants us to allow delegation for a couple of SQL
servers and their service accounts so he can do distributed queries
across linked servers. This is new ground for us from an AD perspective
that I have just started researching and I'd like to hear other's
thoughts, policies etc.

We are at 2003 functional level so from what I read, we can allow
constrained delegation which is much better than un-constrained but most
of the comments I come across indicate this isn't something to be taken
lightly, has serious security ramifications, policies should be in place
etc etc..

I can find a reasonable amount of information from the developers
point-of-view, and I can see how to implement it technically (I think)
but not a whole lot from the AD admin's perspective, especially as it
pertains to the desirability of allowing it and how best to manage it if
it is allowed.

Any info greatly appreciated.

Bob

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http

RE: [ActiveDir] Kerberos Delegation

2005-08-09 Thread Free, Bob
Aric-

(Also trying to answer Joe K's questions)

The developer owns all 3 of the SQL servers involved so he definitely
has a vested interest in the integrity of the data on the SQL servers.
SQL server runs under a domain service account only used on them. They
just wanted me to create the SPN's for the domain account the service
runs under and tick the Account is trusted for delegation on the
service account and Computer is trusted for delegation  on the SQL
servers' machine accounts.

Seemed to me the proper way would be to utilize  Trust this computer
for delegation to specified services only to set up the middle tier
service account to be only able to talk to the back end SQL servers'
services and configure the account to use constrained delegation without
protocol transition by selecting Use Kerberos Only. It also seemed
like only the middle tier needed to have the machine account trusted for
delegation and, finally, that it would be better to run the backend
server under a separate service account with it's own SPN's. Am I close?

Joe- Your point about the limiting the accounts by marking sensitive
and cannot be delegated is well taken. As soon as I started looking at
this can of worms, that occurred to me immediately.

Thanks again

Bob

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Bernard, Aric
Sent: Tuesday, August 09, 2005 3:01 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Bob,

As Rick and Joe mentioned, as far as allowing a system to do something
on behalf of a user, constrained delegation is a pretty good solution.
Your developers need as I understand it is as follows:

User connects to a front application server (i.e. web server) and
authenticates to that server using Kerberos.  The application needs to
be able to contact multiple different SQL servers to perform a
distributed query.  If the application where to do with a service
account, the response to the query would likely contain all of the
information that the service account had that matched the query - this
might contain more or less information than the user making the request
has access to.  In addition the audit trail on the SQL server should
reflect that the application server made the access to the SQL server as
opposed to the user.

Using constrained delegation, the application server is provided the
capability to act as the user when interacting with the identified SQL
servers (only).  If done properly, the application server will be
delegated in a manner that explicitly identifies the SQL servers Service
Principal names (which include port numbers) associated with each SQL
computers object in the directory.  Therefore the application server CAN
impersonate the user but under the constraint that it may only occur
when communicating with the remote server/service/port as named in the
delegation.

In your case the risk should be relatively low so long as your developer
has a vested interest in the integrity of the data on the SQL servers.
The only abuse of this specific configuration that I can think off the
top of my head would be possibility for the developer to execute a
stored procedure on the SQL server with more rights than he or she would
typically have thereby gaining access to or altering data in the DB that
they would otherwise not have access to.

Now if your developer starts asking for constrained delegation from the
application server to a DC, we should talk some more. :)

Regards,

Aric


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
Sent: Tuesday, August 09, 2005 2:33 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

 Assuming that you are aware of what constrained delegation is, how it
operates, and what it should be used for...

That's the point of my query, I certainly don't understand all I know
about it and we have never allowed it, at this point I have just begun
to scratch the surface. I was totally uncomfortable when it was first
proposed and threw up the stop sign. I'm getting less comfortable by the
minute as I read more about it. 

I'm reading the Kerberos Protocol Transition and Constrained Delegation
article and the Troubleshooting Kerberos Delegation white paper and like
I said, trying to understand all I know about it ;-(

Everyone's comments so far are immensely appreciated.

Thanks

Bob

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Bernard, Aric
Sent: Tuesday, August 09, 2005 1:38 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Assuming that you are aware of what constrained delegation is, how it
operates, and what it should be used for...

Anytime you allow someone or something to impersonate, err, act on
behalf of another security principal, there is always cause for concern.
Constrained delegation certainly provides some flexibility in achieving

RE: [ActiveDir] Kerberos Delegation

2005-08-09 Thread Ken Schaefer
You may want to have Kerberos authentication all the way through, rather than
using Protocol Transition. At least in the IIS world, protocol transition
involves running your worker processes as LocalSystem rather than any other
account, which is yet another security issue you need to manage.

Cheers
Ken

www.adOpenStatic.com/cs/blogs/ken/ 

: -Original Message-
: From: [EMAIL PROTECTED] [mailto:ActiveDir-
: [EMAIL PROTECTED] On Behalf Of Free, Bob
: Sent: Wednesday, 10 August 2005 7:33 AM
: To: ActiveDir@mail.activedir.org
: Subject: RE: [ActiveDir] Kerberos Delegation
: 
:  Assuming that you are aware of what constrained delegation is, how it
: operates, and what it should be used for...
: 
: That's the point of my query, I certainly don't understand all I know
: about it and we have never allowed it, at this point I have just begun
: to scratch the surface. I was totally uncomfortable when it was first
: proposed and threw up the stop sign. I'm getting less comfortable by the
: minute as I read more about it.
: 
: I'm reading the Kerberos Protocol Transition and Constrained Delegation
: article and the Troubleshooting Kerberos Delegation white paper and like
: I said, trying to understand all I know about it ;-(
: 
: Everyone's comments so far are immensely appreciated.
: 
: Thanks
: 
: Bob
: 
: -Original Message-
: From: [EMAIL PROTECTED]
: [mailto:[EMAIL PROTECTED] On Behalf Of Bernard, Aric
: Sent: Tuesday, August 09, 2005 1:38 PM
: To: ActiveDir@mail.activedir.org
: Subject: RE: [ActiveDir] Kerberos Delegation
: 
: Assuming that you are aware of what constrained delegation is, how it
: operates, and what it should be used for...
: 
: Anytime you allow someone or something to impersonate, err, act on
: behalf of another security principal, there is always cause for concern.
: Constrained delegation certainly provides some flexibility in achieving
: this goal and fulfilling the applications need, but like any Domain
: Admin in your forest the developer and the application must be trusted.
: 
: I would recommend clear documentation as to the architecture of the
: application, how and with what other systems it interoperates, and if
: you have the wherewithal (or can bring in someone who does) a code
: review to ensure that what is defined is accurate.
: 
: I know this seems a little over-the-top, but we are taking about you
: accepting someone else walking around with my ID and saying he told me
: it was OK that I access fill in the blank on his behalf.
: 
: Regards,
: 
: Aric Bernard
: 
: -Original Message-
: From: [EMAIL PROTECTED]
: [mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
: Sent: Tuesday, August 09, 2005 1:07 PM
: To: ActiveDir@mail.activedir.org
: Subject: [ActiveDir] Kerberos Delegation
: 
: We have a developer who wants us to allow delegation for a couple of SQL
: servers and their service accounts so he can do distributed queries
: across linked servers. This is new ground for us from an AD perspective
: that I have just started researching and I'd like to hear other's
: thoughts, policies etc.
: 
: We are at 2003 functional level so from what I read, we can allow
: constrained delegation which is much better than un-constrained but most
: of the comments I come across indicate this isn't something to be taken
: lightly, has serious security ramifications, policies should be in place
: etc etc..
: 
: I can find a reasonable amount of information from the developers
: point-of-view, and I can see how to implement it technically (I think)
: but not a whole lot from the AD admin's perspective, especially as it
: pertains to the desirability of allowing it and how best to manage it if
: it is allowed.
: 
: Any info greatly appreciated.
: 
: Bob

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


RE: [ActiveDir] Kerberos Delegation

2005-08-09 Thread joseph.e.kaplan
Agreed here.  If you don't need protocol transition, don't use it.  This
normally only comes up in situations where you have to use Basic auth on
the web tier for an Internet-based scenario or something like that.  If
the web server can use IWA, then you can go Kerberos end to end.

Joe K.


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Ken Schaefer
Sent: Tuesday, August 09, 2005 6:44 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

You may want to have Kerberos authentication all the way through, rather
than
using Protocol Transition. At least in the IIS world, protocol
transition
involves running your worker processes as LocalSystem rather than any
other
account, which is yet another security issue you need to manage.

Cheers
Ken

www.adOpenStatic.com/cs/blogs/ken/ 

: -Original Message-
: From: [EMAIL PROTECTED] [mailto:ActiveDir-
: [EMAIL PROTECTED] On Behalf Of Free, Bob
: Sent: Wednesday, 10 August 2005 7:33 AM
: To: ActiveDir@mail.activedir.org
: Subject: RE: [ActiveDir] Kerberos Delegation
: 
:  Assuming that you are aware of what constrained delegation is, how
it
: operates, and what it should be used for...
: 
: That's the point of my query, I certainly don't understand all I know
: about it and we have never allowed it, at this point I have just begun
: to scratch the surface. I was totally uncomfortable when it was first
: proposed and threw up the stop sign. I'm getting less comfortable by
the
: minute as I read more about it.
: 
: I'm reading the Kerberos Protocol Transition and Constrained
Delegation
: article and the Troubleshooting Kerberos Delegation white paper and
like
: I said, trying to understand all I know about it ;-(
: 
: Everyone's comments so far are immensely appreciated.
: 
: Thanks
: 
: Bob
: 
: -Original Message-
: From: [EMAIL PROTECTED]
: [mailto:[EMAIL PROTECTED] On Behalf Of Bernard, Aric
: Sent: Tuesday, August 09, 2005 1:38 PM
: To: ActiveDir@mail.activedir.org
: Subject: RE: [ActiveDir] Kerberos Delegation
: 
: Assuming that you are aware of what constrained delegation is, how it
: operates, and what it should be used for...
: 
: Anytime you allow someone or something to impersonate, err, act on
: behalf of another security principal, there is always cause for
concern.
: Constrained delegation certainly provides some flexibility in
achieving
: this goal and fulfilling the applications need, but like any Domain
: Admin in your forest the developer and the application must be
trusted.
: 
: I would recommend clear documentation as to the architecture of the
: application, how and with what other systems it interoperates, and if
: you have the wherewithal (or can bring in someone who does) a code
: review to ensure that what is defined is accurate.
: 
: I know this seems a little over-the-top, but we are taking about you
: accepting someone else walking around with my ID and saying he told
me
: it was OK that I access fill in the blank on his behalf.
: 
: Regards,
: 
: Aric Bernard
: 
: -Original Message-
: From: [EMAIL PROTECTED]
: [mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
: Sent: Tuesday, August 09, 2005 1:07 PM
: To: ActiveDir@mail.activedir.org
: Subject: [ActiveDir] Kerberos Delegation
: 
: We have a developer who wants us to allow delegation for a couple of
SQL
: servers and their service accounts so he can do distributed queries
: across linked servers. This is new ground for us from an AD
perspective
: that I have just started researching and I'd like to hear other's
: thoughts, policies etc.
: 
: We are at 2003 functional level so from what I read, we can allow
: constrained delegation which is much better than un-constrained but
most
: of the comments I come across indicate this isn't something to be
taken
: lightly, has serious security ramifications, policies should be in
place
: etc etc..
: 
: I can find a reasonable amount of information from the developers
: point-of-view, and I can see how to implement it technically (I think)
: but not a whole lot from the AD admin's perspective, especially as it
: pertains to the desirability of allowing it and how best to manage it
if
: it is allowed.
: 
: Any info greatly appreciated.
: 
: Bob

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/


This message is for the designated recipient only and may contain privileged, 
proprietary, or otherwise private information.  If you have received it in 
error, please notify the sender immediately and delete the original.  Any other 
use of the email by you is prohibited.
List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


RE: [ActiveDir] Kerberos Delegation

2005-08-09 Thread joseph.e.kaplan
I think you've basically got it.  Constrained is the way to go.  You
might consider implementing unconstrained at first for some testing to
make sure you can get it working with the less complicated scenario, but
you want to end up using constrained delegation in the final version.

I would like to point you to Keith Brown's excellent book the .NET
Developers Guide to Window Security which he has graciously published
online as well as in print.  He actually explains this stuff quite well
there and has lots of cross references to the other topics.

http://pluralsight.com/wiki/default.aspx/Keith.GuideBook/HomePage.html

Check out the topics in part 5.  The book is better because it has all
of the illustrations, but the free content is a nice start.

As Aric pointed out, the delegation scenario is actually better from a
security standpoint here in several ways.  All of the queries that will
be executed at the delegation endpoints will be executed and audited
with the original user's credentials instead of a trusted intermediary
service account.  You can then secure the SQL data directly and use
SQL's built-in mechanisms for security features.  The alternative is to
give access to all of the data to a specific service account and then
make the developer implement their own security layer to restrict
different data to different users.  Rolling your own security is
probably a much higher security risk in the long run.

Joe K.


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
Sent: Tuesday, August 09, 2005 6:11 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Aric-

(Also trying to answer Joe K's questions)

The developer owns all 3 of the SQL servers involved so he definitely
has a vested interest in the integrity of the data on the SQL servers.
SQL server runs under a domain service account only used on them. They
just wanted me to create the SPN's for the domain account the service
runs under and tick the Account is trusted for delegation on the
service account and Computer is trusted for delegation  on the SQL
servers' machine accounts.

Seemed to me the proper way would be to utilize  Trust this computer
for delegation to specified services only to set up the middle tier
service account to be only able to talk to the back end SQL servers'
services and configure the account to use constrained delegation without
protocol transition by selecting Use Kerberos Only. It also seemed
like only the middle tier needed to have the machine account trusted for
delegation and, finally, that it would be better to run the backend
server under a separate service account with it's own SPN's. Am I close?

Joe- Your point about the limiting the accounts by marking sensitive
and cannot be delegated is well taken. As soon as I started looking at
this can of worms, that occurred to me immediately.

Thanks again

Bob

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Bernard, Aric
Sent: Tuesday, August 09, 2005 3:01 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Kerberos Delegation

Bob,

As Rick and Joe mentioned, as far as allowing a system to do something
on behalf of a user, constrained delegation is a pretty good solution.
Your developers need as I understand it is as follows:

User connects to a front application server (i.e. web server) and
authenticates to that server using Kerberos.  The application needs to
be able to contact multiple different SQL servers to perform a
distributed query.  If the application where to do with a service
account, the response to the query would likely contain all of the
information that the service account had that matched the query - this
might contain more or less information than the user making the request
has access to.  In addition the audit trail on the SQL server should
reflect that the application server made the access to the SQL server as
opposed to the user.

Using constrained delegation, the application server is provided the
capability to act as the user when interacting with the identified SQL
servers (only).  If done properly, the application server will be
delegated in a manner that explicitly identifies the SQL servers Service
Principal names (which include port numbers) associated with each SQL
computers object in the directory.  Therefore the application server CAN
impersonate the user but under the constraint that it may only occur
when communicating with the remote server/service/port as named in the
delegation.

In your case the risk should be relatively low so long as your developer
has a vested interest in the integrity of the data on the SQL servers.
The only abuse of this specific configuration that I can think off the
top of my head would be possibility for the developer to execute a
stored procedure on the SQL server with more rights than he or she would
typically have thereby gaining access to or altering data in the DB

RE: [ActiveDir] Kerberos Delegation

2004-06-12 Thread Carlos Magalhaes



Yeah Sure, since i have been dealing with Kerberos 
Delegation issues for the past week non stop here is a good 
link.
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/security/tkerbdel.mspx

And oh yeah --- GOOD LUCK :P

ADSI or System.DirectoryServices programmin? - http://groups.yahoo.com/group/adsianddirectoryServices 

Carlos Magalhaes - Directory Services Programming 
MVP


From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Isham, Alan 
ASent: Friday, June 11, 2004 7:58 PMTo: 
[EMAIL PROTECTED]Subject: [ActiveDir] Kerberos 
Delegation

Can anyone share an end-to-end 
business process or a listing of security controls used to manage Kerberos 
Delegation in Windows 2000 Advanced Server or Windows Server 
2003?

Thanks,
- 
Alan


[ActiveDir] Kerberos Delegation

2004-06-11 Thread Isham, Alan A



Can anyone share an end-to-end 
business process or a listing of security controls used to manage Kerberos 
Delegation in Windows 2000 Advanced Server or Windows Server 
2003?

Thanks,
- 
Alan