IT tutorials
 
Applications Server
 

Microsoft Dynamic CRM 4.0 : Authentication (part 4)

11/26/2011 5:37:22 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
Debugging Kerberos

One of the hardest things to debug in the organization is security, especially when the security is passed through several middle-tier applications and the system administrator does not have access to intercept the request in the middle.

However, the most common problems users experience is that the front application will load, but there may be some areas that may be missing data. For example, when users open the Microsoft CRM Dynamics application and click the Reports section, they will be able to view the list of the reports. When they click it, they will be allowed to choose the filter criteria. When they try to run the report, however, they will get a CRM authentication failure (as shown in Figure 14).

Figure 14. Microsoft Dynamics CRM reporting error.


To debug Kerberos, you have to start debugging on the server side first and then move to the client. Microsoft has created a variety of tools to help facilitate this. Here is a list of some server-side tools (further details in the next section):

  • IIS utilities

  • Windows Resource Kit

  • Kerberos logging

To complete the investigation/debugging, here are some client-side tools (detailed later):

  • wFetch

  • kList

  • KerbTray

IIS Utilities (Installed on the Server)

You can find the IIS utility Authentication and Access Control Diagnostics 1.0 (x86) at http://www.microsoft.com/downloads/details.aspx?FamilyId=E90FE-4A21-4066-BD22-B931F7572E9A&displaylang=en.

This utility must be installed on the web server. You can save the output as an XML file and review it for configuration problems (as shown in Figure 15).

Figure 15. Graphical view of settings (AD, IIS, user and computer accounts).

This tool helps highlight misconfigured SPNs quickly.

Windows Resource Kit

The Resource Kit contains a couple of very useful utilities to debug Kerberos. In this section, we demonstrate the KerbTray and the kList tools specifically. You can download the Windows Resource Kit from the Microsoft website at http://www.microsoft.com/windows2000/techinfo/reskit/tools/existing/kerbtray-o.asp.

  • KerbTray (client-side tool)

    This tool runs in the system tray and displays the active tickets issued to the client computer and user.

  • kList

    This tool lets you view the tickets in a command-line console. You can also purge specific tickets to debug reenrollment of tickets.

    You can also view the ticket-granting service (TGS).

The following code sample shows via kList the ticket-granting authority to which the user is connected):

C:\Program Files\Windows Resource Kits\Tools>klist tgt
Cached TGT:

ServiceName: krbtgt
TargetName: krbtgt
FullServiceName: rbhaiya
DomainName: Domain.Local
TargetDomainName: Domain.Local
AltTargetDomainName: Domain.Local
TicketFlags: 0x40e00000
KeyExpirationTime: 0/40/4 0:00:10776
StartTime: 10/8/2008 16:57:52
EndTime: 10/9/2008 2:57:52
RenewUntil: 10/15/2008 16:57:52
TimeSkew: 10/15/2008 16:57:52

The next code sample shows via kList the tickets owned by the user:

C:\Program Files\Windows Resource Kits\Tools>klist tickets

Cached Tickets: (2)

Server: krbtgt/[email protected]
KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
End Time: 10/9/2008 2:57:52
Renew Time: 10/15/2008 16:57:52

Server: HTTP/[email protected]
KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
End Time: 10/9/2008 2:57:52
Renew Time: 10/15/2008 16:57:52

Kerberos Logging

To enable Kerberos event logging, change the following Registry value and restart the computer:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters
Registry Value: LogLevel
Value Type: REG_DWORD
Value Data: 0x1

This will give verbose logging in the event logs.

 
Others
 
- Microsoft Dynamic CRM 4.0 : Authentication (part 3)
- Microsoft Dynamic CRM 4.0 : Authentication (part 2)
- Microsoft Dynamic CRM 4.0 : Authentication (part 1)
- Implementing with Microsoft Dynamics Sure Step 2010 : Setting up a program for solution rollout
- Implementing with Microsoft Dynamics Sure Step 2010 : Waterfall-based implementation project types
- Microsoft Dynamics AX 2009 : Design and Implementation Patterns (part 2) - Table-Level Patterns
- Microsoft Dynamics AX 2009 : Design and Implementation Patterns (part 1) - Class-Level Patterns
- BizTalk 2009 : Creating More Complex Pipeline Components (part 4) - Custom Disassemblers
- BizTalk 2009 : Creating More Complex Pipeline Components (part 3) - Validating and Storing Properties in the Designer
- BizTalk 2009 : Creating More Complex Pipeline Components (part 2) - Schema Selection in VS .NET Designer
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us