Solved

OWA Forms Based Authentication

Posted on 2006-06-13
8
313 Views
Last Modified: 2010-03-06
Hi,

I've configured OWA forms based authentication, and set up ssl using a wild card certificate. I've published it using ISA 2004. I can log in to OWA using FBA but the images don't load up. What could stop the FBA images from loading?

Please help


0
Comment
Question by:maykut
8 Comments
 
LVL 12

Expert Comment

by:aa230002
ID: 16892095
Please check the Internet Explorer's settings. IE - Tools - Internet Options - Advanced.

Thanks,
Amit Aggarwal.
0
 
LVL 1

Author Comment

by:maykut
ID: 16893071
What settings in IE. I'm using IE 7 beta 2 for Windows XP with SP2
0
 
LVL 31

Accepted Solution

by:
LeeDerbyshire earned 50 total points
ID: 16894279
Have a look at the properties of your exchweb Virtual Directory in IIS Manager.  On the Directory Security page, make sure that Anonymous Access is enabled.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 13

Expert Comment

by:eatmeimadanish
ID: 16894455
This is almost always a permission issue (which is common because Microsoft felt having a correctly configured server install was out of the question).
0
 
LVL 1

Author Comment

by:maykut
ID: 16898950
Ok I'll give it try tonight.
0
 
LVL 1

Author Comment

by:maykut
ID: 16917043
Hi Lee,

You were wright it was a permissions problem. I enabled Anonymous Access and know all the pictures are showing. Thanks so much for that
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
how to add IIS SMTP to handle application/Scanner relays into office 365.
This video discusses moving either the default database or any database to a new volume.

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question