Download presentation
Presentation is loading. Please wait.
Published byCandice Ferguson Modified over 9 years ago
1
… the easy way! Image © Wikimedia CC
3
Please visit our Gold Sponsor stands, we couldn't do it without you…
4
MCTS in SQL Server and SharePoint Over a decade of Microsoft solution development and architecture Lately focused on SQL Server 2012 BI in SharePoint Integrated Mode I like dogs, especially big ones
5
Focus on SharePoint + SQL Server Why Kerberos Service Principal Names Delegation options Claims & Kerberos Testing &Troubleshooting Live Demo!
6
More secure, Less DC load, interoperability... Enables Delegation! ◦ Unified Security at data source level ◦ Data driven security ◦ Personalised reports NTLM or Kerberos SP Farm or DB server Kerberos Delegation Data Source
7
NTLM or Kerberos SP Farm Data Source 1st “hop” Any protocol 2 nd “hop” Kerberos only! Impersonate user
8
Identify your data sources Service Principle Names Decide on your delegation Constrained or not? Set delegation type Allow data sources to be delegated to Easy, right?
9
Service Principal Name ◦ What (Service) and ◦ Where (Computer or “Principal”) to connect to Identifies the target ◦ Not the delegating service ◦ Certainly not the client ◦ The Data Source Service! 1
10
Service Principal Name <service class>/ [:<port or instance>] or/and <service class>/ [:<port or instance>] setspn.exe -S Service identity: Service account as or Host Account if running as Local System Host identity 1
11
NetBIOS: BI-SQL FQDN: Hades.Local Port: 49753 SQL-DB Domain Database service account identity SETSPN -S MSSQLSVC/BI-SQL:49753 HADES\SQL-DB BI-SQL.HADES.LOCAL Database service class Host server OR
12
SETSPN -S MSOLAPSVC.3/BI-SQL:UDM HADES\SQL-SSAS NetBIOS: BI-SQL FQDN: Hades. Local SQL-SSAS Domain SSAS service account identity Analysis Services Service class Host server OR Instance: UDM BI-SQL.HADES.LOCAL
13
IIS server SP-WFE FQDN: Hades. Local SP-PORTAL SharePoint Portal Application Pool identity SharePoint WFE Host server OR OLYMPUS.HADES.LOCAL SETSPN -S HTTP/OLYMPUS HADES\SP-PORTAL DNS “A” record: OLYMPUS Port: 80
14
Now I can see Delegation tab! SETSPN -S DUMMYSPN HADES\SP-XLS-SVC ? FQDN: Hades. Local SP-XLS-SVC DomainDelegating account Arbitrary string Non-existing service
15
Identifies the target Stored against target’s identity Instance name for Analysis Services Arbitrary SPN to show delegation tab Don’t forget discovery services for SQL2005 1
16
Basic (unconstrained) ◦ To any Service Constrained ◦ Only if allowed 2
17
2 SSRS SSRS Basic ◦ Delegates to any service ◦ Cross-domain delegation ◦ No protocol transition ◦ Can precede constrained Constrained ◦ Any service can use ◦ Most require ◦ More secure ◦ Only delegates if allowed! ◦ Only within a domain
18
Client SharePoint Farm Kerberos Data Source NTLM No Trust is OK! MSFT.com pintoso.MSFT.com contoso.MSFT.com Constrained delegation works!
19
Client SharePoint Farm Basic Kerberos Data Source NTLM or Basic Kerberos Must have Two Way Trust MSFT.com pintoso.MSFT.com contoso.MSFT.com
20
Use Basic for ◦ SSRS (SQL Reporting Services) to connect to another domain ◦ When security is not critical Use Constrained for ◦ Any other case! 2
21
NTLM or Kerberos SP Farm Data Source Delegating Account SPN Account
22
Add a dummy SPN to the Delegating account to bring up delegation tab in ADUC: Allows trust for constrained delegation Enables protocol transition for SharePoint 3
23
Select allowed SPNs: Use ADUC delegation tab Locate SPN’s account Click to select SPNs to add SPN’s account 4
24
ADSIEdit (easier): ◦ Same string as in SETSPN statement PowerShell: ◦ Not for wimps ◦ Active Directory Module: Set-ADObject Get-ADObject Set-KCD CMD (document): ◦ ldifde
25
Set your SPNs (inc Dummy and Browser 2005) Use “KerberosHelper.xslx” from www.data-united.co.ukwww.data-united.co.uk Decide: Basic or Constrained? Set delegation type Add Allowed SPNs (for constrained) Test working, Sit back and relax! Let me know if it doesn't work www.data-united.co.uk
26
Claims to Windows Token Service (C2WTS) ◦ SharePoint protocol transition: Kerberos Delegation! NTLM or Kerberos SharePoint Web Frontend SharePoint Application Server Data Source STS Claims C2WTS ? UPN Claim Windows Token
27
Starts automatically Depends on Cryptographic Service ◦ sc config c2wts depend= CryptSvc Service Identity is trusted for delegation ◦ Local System by default (and should stay that way) ◦ If changed to Windows Identity, must be a local admin Claims-aware services are allowedCaller s ◦ c2wtshost.exe.config Use Rodney Viana's little tool c2WTSTest.exeRodney Viana's
28
“NT Authority/Anonymous” is no more! Profiler shows Your login Test every service against every data source SSRS
29
15 character limit on Windows NetBIOS Open Port 88 on Firewall SPN for SQL 2005 browser/discovery services Sensitive Client Account
30
Enable Kerberos logging (don’t forget about it!) Registry hack http://support.microsoft.com/kb/262177http://support.microsoft.com/kb/262177 Check Kerberos errors in Event log on SP App server and client ULS log (SP App server with Verbose) Use Event log, Kerbtray and Kerberos helper tools to check for common errors Use Klist –purge to re-test Kerberos Use dcdiag to check SPNs
31
32
Sponsor Competition Draws in the Exhibition Hall 17:15 After …
33
Community Events SQL Saturday Edinburgh7/8 Junewww.sqlsaturday.com/202/ SQL Relay17/27 Junewww.sqlrelay.co.uk SQL Saturday Dublin21/22 Junewww.sqlsaturday.com/229/ SQL Saturday Cambridge27 Septemberwww.sqlsaturday.com/228/ UK User GroupsAll the timewww.sqlserverfaq.com
34
Please complete feedback http://sqlbits.com/SQLBitsXIThursday http://sqlbits.com/SQLBitsXIFriday http://sqlbits.com/SQLBitsXISaturday http://sqlbits.com/SQLBitsXI (General feedback)
35
We hope you had a great conference day! Keep checking www.sqlbits.com for slides, videos and news of the next conference www.sqlbits.com # SQLBIT S
36
Kerberos: authentication protocol Principal – a computer in the Kerberos protocol, usually the target UPN: user principal name FQDN: Fully Qualified Domain Name WCF: Windows Communication Foundation (.NET) C2WTS: WCF service granting windows token for a UPN claim
37
How the Kerberos Version 5 Authentication Protocol Works http://technet.microsoft.com/en-us/library/cc772815(v=ws.10).aspx Overview of Kerberos authentication for Microsoft SharePoint 2010 Products http://technet.microsoft.com/en-us/library/gg502594.aspx Kerberos Guide for SharePoint 2013 http://blog.blksthl.com/2012/09/26/the-first-kerberos-guide-for-sharepoint-2013-technicians/ Kerberos Blog and Resources www.data-united.co.uk
38
Kerberos using PowerShell http://blog.msresource.net/2012/07/12/fim-service-principal-names-and-kerberos-delegation/ Troubleshooting C2WTS by Rodney Viana http://blogs.msdn.com/b/rodneyviana/archive/2011/07/19/troubleshooting-claims-to- windows-nt-token-service-c2wts-in-sharepoint-2010-may-be-difficult-if-you-don-t-know-where- to-start.aspx Kerberos Professional Services www.data-united.co.uk
39
Command Prompt ◦ List all Kerberos Tickets on the principal (a ticket must be present for the URL, otherwise NTLM is used) Klist ◦ Purge Kerberos Tickets (run on all principals to avoid reboot/wait) Klist –purge ◦ List all msDS-AllowedToDelegateTo properties for a single account (only computers with ) ldifde -f c:\temp\filename.txt -d "CN=SA_SVC_C2WTS,OU=Service Accounts,DC=contoso,DC=msft,DC=com" -l msDS-AllowedToDelegateTo ◦ List all msDS-AllowedToDelegateTo properties all accounts in an OU: ldifde -f c:\temp\filename.txt -d "OU=Service Accounts, DC=contoso,DC=msft,DC=com" -l msDS-AllowedToDelegateTo
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.