Solved

IIS 6.0 authentication

Posted on 2006-07-18
3
171 Views
Last Modified: 2013-12-04
I am investigating methods of authentication in IIS 6.0. Though on an internal MS domain, I need to have users login using a form, since some users access it from kiosk type clients.

Should IIS be set to "forms" or if set to "windows" will negotiate the proper method. Could I also use basic and force SSL on?

IIS will authenticate the users against Active Directory in the domain and the web server is a member of the domain.

There is to be no anonymous access.

Thanks.
0
Comment
Question by:banjo1960
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 34

Accepted Solution

by:
Dave_Dietz earned 250 total points
ID: 17172562
IIS doesn't have a "Forms" authentication type.

ASP.Net has forms based auth functionality and OWA also has a forms based auth functionality.

If you use Windows authentication it will be used if the client understands Windows Integrated auth.  If enabled Basic would be used if the client doesn't understand Windows Integrated.

You can use SSL with any auth type since it has nothing to do with authentication.

Dave Dietz
0

Featured Post

What Is Transaction Monitoring and who needs it?

Synthetic Transaction Monitoring that you need for the day to day, which ensures your business website keeps running optimally, and that there is no downtime to impact your customer experience.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question