Solved

Sharepoint foundation 2010 cannot login to a site collection created using powershell

Posted on 2010-11-19
6
1,094 Views
Last Modified: 2012-05-10
I wonder if someone can help me understand what I am missing here.

I am trying to create a host header based site collection in Sharepoint Foundation 2010 using powershell.  The creation process appears to complete ok but after the site collection has been created it is inaccessible.  What I mean by this is that pointing a browser at the new site collection gets a prompt for login but when I try to login using the credentials for the site administrator those credentials are never recognised.  This is my environment.

The server on which SPF is installed has  a computer name of DELL-M4300.   We have a Active Directory/dns server configured that correctly points to DELL-M4300 and dell-m4300.mydomain.com. If I ping either of these addresses, they resolve fine.

I have a web application configured using Sharepoint Central Administration that is on port 80.  This application is configured to use windows authentication using NTLM.

I can create a root site collection through Central Administration and asisgn myself as a site administrator using my account mydomain\nick

Once created, this site collection is accessible at address http://DELL-M4300.  I can login to this site collection using my account mydomain\nick.

So, now I want to create a host header based site collection to be available at http://www.dell-m4300.mydomain.com.   I have created entries for this address in dns and confirmed that I can ping the entry (www.dell-m4300.mydomain.com).

Using powershell, I am trying to create a site collection based on the team site template.  To do this I am using the commands:

$template=Get-SPWebTemplate "STS#0"
New-SPSite http://www.dell-m4300.mydomain.com -OwnerAlias mydomain\nick -HostHeaderWebApplication http://DELL-M4300 -Template $template

This process runs ok in powershell and comes back indicating success.   Also, if I now go to Central Administration, I can see the new site collection www.dell-m4300.mydomain.com listed with my user account as an administrator.

However, if I then browse to http://www.dell-m4300.mydomain.com, I immediately get a login prompt.  I enter my user account details correctly but the login prompt immediately pops up again.  In other words, it is impossible to login.  I have tried this entire process using other user accounts, adding secondary administrators, etc but none of the user accounts can login.

One final note.  If I create a new path based site collection in the same application using Central Administration with myself as site administrator, everything works just fine.   Once created, I can login to the path based web site with no problem.

Any advice would be very appreciated.

Nick
0
Comment
Question by:evanstest
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
6 Comments
 
LVL 38

Accepted Solution

by:
Justin Smith earned 500 total points
ID: 34175702
when you are browsing to the site, are you doing it on the server?  do you get the same results if you try from an outside computer?
0
 
LVL 38

Expert Comment

by:Justin Smith
ID: 34175757
also, do you have an a host header entry on your IIS site for this web app?
0
 
LVL 1

Author Comment

by:evanstest
ID: 34179204
I was trying to browse the site on the server itself.  Actually, this installation is for a development platform (DELL-M4300 is actually a laptop) so being able to log in from the server is critical.

Following your comment however, I have this morning tried to log in from an outside computer.  This works fine!  No problem to log in.

I don't have any host header entry on the IIS site for this web app.

Based on the above, do you have any idea what might be going on to prevent access on the server itself?

Thanks a lot.
0
Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

 
LVL 1

Author Comment

by:evanstest
ID: 34179246
Just a quick follow up.  I repeated the process on another server (our production server) with exactly the same results.   The host header site collection cannot be logged into from the server itself but can be logged into from a different PC.  Any further assistance would be greatly appreciated.
0
 
LVL 1

Author Comment

by:evanstest
ID: 34179272
I think I found a solution to this problem.  It is documented here:

http://support.microsoft.com/kb/896861

I followed method 1 work around but did not implement step 1 from that method.  

Thanks for all the help.
0
 
LVL 1

Author Closing Comment

by:evanstest
ID: 34179276
This comment pointed me in the right direction to narrow in on the problem and eventually find a solution.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question