Solved

Implications of switching to Claims Based Authentication

Posted on 2013-01-07
4
404 Views
Last Modified: 2013-01-07
I need to switch to Claims Based Authentication to get my 2FA application protecting our Sharepoint site correctly.
Are there any negative implications to the configuration of just changing it?
Will in impact on anything else?
Sorry to be so vague.
0
Comment
Question by:David_J_G
  • 2
  • 2
4 Comments
 
LVL 14

Expert Comment

by:KoenVosters
ID: 38750909
I could write it all down here on what to do (and the impact) but there is a great technet article that explains it all:

http://technet.microsoft.com/en-us/library/gg251985.aspx
0
 

Author Comment

by:David_J_G
ID: 38751215
Thanks for the link KoenVosters.

I'm not really up to speed with powershell etc but an interesting and useful document.

I could not see any real statements in it about any downsides to moving from classic mode to CBA.

Are there any?
0
 
LVL 14

Accepted Solution

by:
KoenVosters earned 500 total points
ID: 38751358
The only issues I've seen in the past have been with custom applications that use code that works with strings to do funky things to identify the user by the loginname. Other than that, I haven't really seen any issues. The one thing that does not work with claims based authentication is the document preview with FAST search (at least in 2010, in 2013 it's the other way around)

Just make sure you have a backup of your content database so that if needed you can recreate the web application with classic mode authentication and reattach the content database.
0
 

Author Closing Comment

by:David_J_G
ID: 38751427
Thanks
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now