Darwin's Idle Times...

Living it up and Learning

Browse by Tags

Tagged Content List
  • Blog Post: Authenticating via Kerberos against a web service using a C++ client...

    I just thought this information might assist in expediting your research into the matter. When using the automatically generated proxy class template that is created when referencing a web service from a C++ client application, you may define the proxy as per the following example:- Service::CServiceT<>...
  • Blog Post: Delegation and LDAP

    A customer had a requirement to pull pieces of information about the browser user from AD in their web application. Accessible to the web application is the browser user's alias and the domain that the browser user belongs to. The customer achieves this in their development environment by doing a...
  • Blog Post: Kerberos Authentication with IIS

    So you have decided to go with the delegation security model for your application. You have been developing all of the tiers of your application on your single development box where everything worked according to expectations. You have now separated all of the tiers into separate boxes for testing because...
  • Blog Post: To Delegate Or Not To...

    As part of my role at Microsoft, I sometimes assist customers in making design decisions with their applications. After understanding what the requirements are for the application, I seek relevant information or resources based on the requirements. Any relevant information I find, I will forward to the...
  • Blog Post: Kerberos Delegation to SQL Server

    One of the most difficult issues to troubleshoot sometimes is a Kerberos Delegation issue to SQL Server. A customer had a web application that is configured to access a remote back end SQL server under the security context of the end user. When users access the web application, the application displays...
Page 1 of 1 (5 items)