Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

OWA Access and NTLM

Posted on 2000-05-16
2
Medium Priority
?
617 Views
Last Modified: 2013-12-19
I have recently installed OWA on a Proxy server.  I got the OWA working allowing Basic Authentication and Allowing Anonymous Access.  Then I tried adding the NTLM support.  After struggling with this for some time, I decided to remove the NTLM Authentication; however, it is still trying to verify all users with NTLM.  Why would it do this?
0
Comment
Question by:tesla
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Accepted Solution

by:
jcindia earned 150 total points
ID: 2826740
You have to stop and start the www service.
0
 

Author Comment

by:tesla
ID: 2826925
jcindia.  Thanks.  I already tried restarting the www services, I even rebooted the system and it still behaves the same way.  However, after checking on the file permissions on the logon.asp, I found that access was restricted.  After removing these restrictions, The access was working properly.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Have you ever set up your wireless router at home or in the office to find that you little pop-up bubble in the bottom right-hand corner of Windows read "IP Conflict - One of more computers on the network have been assigned the following IP address"…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question