Solved

Implications of switching to Claims Based Authentication

Posted on 2013-01-07
4
406 Views
Last Modified: 2013-01-07
I need to switch to Claims Based Authentication to get my 2FA application protecting our Sharepoint site correctly.
Are there any negative implications to the configuration of just changing it?
Will in impact on anything else?
Sorry to be so vague.
0
Comment
Question by:David_J_G
  • 2
  • 2
4 Comments
 
LVL 14

Expert Comment

by:KoenVosters
ID: 38750909
I could write it all down here on what to do (and the impact) but there is a great technet article that explains it all:

http://technet.microsoft.com/en-us/library/gg251985.aspx
0
 

Author Comment

by:David_J_G
ID: 38751215
Thanks for the link KoenVosters.

I'm not really up to speed with powershell etc but an interesting and useful document.

I could not see any real statements in it about any downsides to moving from classic mode to CBA.

Are there any?
0
 
LVL 14

Accepted Solution

by:
KoenVosters earned 500 total points
ID: 38751358
The only issues I've seen in the past have been with custom applications that use code that works with strings to do funky things to identify the user by the loginname. Other than that, I haven't really seen any issues. The one thing that does not work with claims based authentication is the document preview with FAST search (at least in 2010, in 2013 it's the other way around)

Just make sure you have a backup of your content database so that if needed you can recreate the web application with classic mode authentication and reattach the content database.
0
 

Author Closing Comment

by:David_J_G
ID: 38751427
Thanks
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
As a business owner, there are many things that keep you up at night. Profit margins, employee retention, human resource protocols, whether your product or service will remain competitive. When you own or manage a technology company that operates la…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question