Solved

Implications of switching to Claims Based Authentication

Posted on 2013-01-07
4
412 Views
Last Modified: 2013-01-07
I need to switch to Claims Based Authentication to get my 2FA application protecting our Sharepoint site correctly.
Are there any negative implications to the configuration of just changing it?
Will in impact on anything else?
Sorry to be so vague.
0
Comment
Question by:David_J_G
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 14

Expert Comment

by:KoenVosters
ID: 38750909
I could write it all down here on what to do (and the impact) but there is a great technet article that explains it all:

http://technet.microsoft.com/en-us/library/gg251985.aspx
0
 

Author Comment

by:David_J_G
ID: 38751215
Thanks for the link KoenVosters.

I'm not really up to speed with powershell etc but an interesting and useful document.

I could not see any real statements in it about any downsides to moving from classic mode to CBA.

Are there any?
0
 
LVL 14

Accepted Solution

by:
KoenVosters earned 500 total points
ID: 38751358
The only issues I've seen in the past have been with custom applications that use code that works with strings to do funky things to identify the user by the loginname. Other than that, I haven't really seen any issues. The one thing that does not work with claims based authentication is the document preview with FAST search (at least in 2010, in 2013 it's the other way around)

Just make sure you have a backup of your content database so that if needed you can recreate the web application with classic mode authentication and reattach the content database.
0
 

Author Closing Comment

by:David_J_G
ID: 38751427
Thanks
0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question