473,503 Members | 2,076 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

strange authentication problem involving cluster

Hello,

I have encountered strange problem regarding authentication and
clustering.
This is the scenario:
We have an intranet web site with anonymous access, security using
forms Auth and impersonate true. Web site is running under domain
account (called "natar") and connection to DB done through Trusted
connection (with this domain account).

In this site we have another folder which is configured as WINDOWS
authentication
And connection to db done through specific username/password.

We have one group of people browsing the main part of the web site
(anonymous access) and other group receiving email with link to the
WINDOWS authentication part which they can access directly without
being asked for authentication.
Everything is working fine on a one web server configuration env.

The problem we encountered is that in a clustered Env. (MS application
center),
When user browsing the main part of the web site, opens another window
to browse the WINDOWS authentication part and return to the previous
window - HE somehow inherits the windows authentication and receives
the following error:
Cannot open database requested in login 'natar'. Login fails. Login
failed for user 'NT AUTHORITY\ANONYMOUS LOGON'.
He somehow losses the anonymous access with forms auth., and trying to
access with his own account ?!

Apr 25 '06 #1
0 1004

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

8
3677
by: Bob Everland | last post by:
I have an application that is ISAPI and the only way to secure it is through NT permissions. I need to have a way to login to windows authentication so that when I get to the ISAPI application no...
7
2910
by: jrefactors | last post by:
I want to ask how password is stored and how to check the authentication? I have heard password is never encrypted and decrypted, but it is hashed. For example, consider a simple email logon...
1
1786
by: Nic | last post by:
Hi, I am using a 4 node AIX cluster with DB2 installed and controlled via Veritas Cluster Manager. VCS will fail databases between the 4 nodes when required. I also have LDAP configured, so...
6
2920
by: Edd Dawson | last post by:
Hi. I have a strange problem involving the passing of command line arguments to a C program I'm writing. I tried posting this in comp.programming yesterday but someone kindly suggested that I'd...
2
2127
by: Jerry O | last post by:
Hi, I appear to have a problem where the user is not kicked back to the forms authentictation url when they post a webform, via a get, that results in a long url due to viewstate. Instead they...
3
5400
by: Simon | last post by:
Hi All, I'm hoping someone will have some words of wisdom for me regarding MS Clustering on Windows 2003. I have a service that runs on a cluster. During invocation it's supposed to...
0
4164
by: GCeaser | last post by:
OK - So I know SiteMinder can work with IIS and ASP.Net 2.0. Here is the problem, SiteMinder from what I understand requires a client on every IIS box hosting a protected site that requires...
2
957
by: zacks | last post by:
A couple of the engineers I work with are seeing a strange problem with an application I developed in .NET 2.0. I am suspecting this is being caused by the environment since so far it only happens...
4
1774
by: John Brock | last post by:
I have a .NET application that, among other things, creates Excel workbooks, and I have run into a very strange problem involving formulas on one worksheet that reference values on another...
0
7063
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
7258
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
7313
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
1
6970
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
5558
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
3156
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
0
1489
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated ...
1
720
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
366
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.