Solved

401 - Unauthorized: Access is denied due to invalid credentials only while on the server box itself

Posted on 2010-09-22
4
1,432 Views
Last Modified: 2012-05-10
I have a subdirectory for a website that has Anonymous disabled and Windows Authentication enabled.
 
This works great when I browse to it from my client PC (which I'm logged into under our corporate domain account).  However, when I'm logged onto the actual server box as a domain account, when I browse to that directory, I get the challenge dialog, put in my domain credentials, and it keeps prompting me for them 3 times, then I get the unauthorized access page.
0
Comment
Question by:E43509
  • 3
4 Comments
 

Author Comment

by:E43509
ID: 33736218
Just some more info, if I enable anonymous on that directory, the browser responds with the page.
For testing it was just a simple hello.htm
The application pool is using the ApplicationPoolIdentity
0
 

Author Comment

by:E43509
ID: 33736486
Additional info
It works in the default web site.  On the server, I get a challenge, fill in my credentials and good to go
However, this needs to work on another site configured on the server.  
The new site works when anonymous is permitted but can't get past the challenge.  The site is local on the server box and is using the same application pool as the default site and pass thru authentication as is the default site.
0
 
LVL 17

Assisted Solution

by:kadadi_v
kadadi_v earned 500 total points
ID: 33744780
Did you configured the IP Security settings for this Site In IIS so that's why its not working on Local server..?

Regards,
vijay
0
 

Accepted Solution

by:
E43509 earned 0 total points
ID: 33853255
Just a follow up, I may have been in an wacko mode as I was also trying to get .net framework 1.1 loaded on this w2008 box but have since tested the app and it ran under the 2.0 framework.  I removed all the 1.1 crappola and this appears to be working.
Thanks for the input above
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

First of all, clustering IIS is something you should rarely consider doing. In almost all cases, Microsoft Network Load Balancing (NLB) (http://technet.microsoft.com/en-us/library/cc758834(WS.10).aspx) is a much better solution when you need to p…
Running classic asp applications under Windows Server 2008 R2 (x64) and IIS 7 is not as easy as one may think. It took me a while to figure it out while getting error 8002801d a few times. After you install the OS you will need to install the fol…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now