Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Implications of switching to Claims Based Authentication

Posted on 2013-01-07
4
Medium Priority
?
428 Views
Last Modified: 2013-01-07
I need to switch to Claims Based Authentication to get my 2FA application protecting our Sharepoint site correctly.
Are there any negative implications to the configuration of just changing it?
Will in impact on anything else?
Sorry to be so vague.
0
Comment
Question by:David_J_G
  • 2
  • 2
4 Comments
 
LVL 14

Expert Comment

by:KoenVosters
ID: 38750909
I could write it all down here on what to do (and the impact) but there is a great technet article that explains it all:

http://technet.microsoft.com/en-us/library/gg251985.aspx
0
 

Author Comment

by:David_J_G
ID: 38751215
Thanks for the link KoenVosters.

I'm not really up to speed with powershell etc but an interesting and useful document.

I could not see any real statements in it about any downsides to moving from classic mode to CBA.

Are there any?
0
 
LVL 14

Accepted Solution

by:
KoenVosters earned 2000 total points
ID: 38751358
The only issues I've seen in the past have been with custom applications that use code that works with strings to do funky things to identify the user by the loginname. Other than that, I haven't really seen any issues. The one thing that does not work with claims based authentication is the document preview with FAST search (at least in 2010, in 2013 it's the other way around)

Just make sure you have a backup of your content database so that if needed you can recreate the web application with classic mode authentication and reattach the content database.
0
 

Author Closing Comment

by:David_J_G
ID: 38751427
Thanks
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
With more and more companies allowing their employees to work remotely, it begs the question: What are some of the security risks involved with remote employees and what actions should we take to secure them?
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

569 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question