Author: Chris BailissTechnical Reviewers (Kerberos/Claims): James Noyce, Paul Williams
This series of posts provides an overview of the authentication methods and associated functionality supported by the Business Intelligence Service Applications in SharePoint 2010, covering:
I have assumed that you have an understanding of SharePoint concepts such as web applications, service applications, etc.
This article isn’t going to repeat lots of detailed material available elsewhere about how to configure each of the above services.
Rather, the aim is to provide an overview of what works and what doesn’t from a BI perspective (I’m a SQL BI Consultant). Particular attention will be paid to differences in BI-functionality between the Classic-mode and Claims-mode authentication options in SharePoint, and how this supports or doesn’t support passing user identity to back end systems.
SharePoint authentication methods covered will include:
There is a lot to cover so this article will be split into a series of parts:
Screen shots will be shown to illustrate the text – they are functional, not pretty!
If you’re not interested in how the testing was carried out, skip to the summary at the end.
Examples will be shown from my scaled-out Hyper-V lab environment, consisting of:
All are running Windows 2008 R2 SP1 and SQL 2008 R2 SP1 / SharePoint Server 2010 SP1.
Wherever references are made to Kerberos within this article, this is all within the same domain.
Two web applications have been configured in this environment:
These will be described and compared in more detail in the coming posts.
Continue reading in Part 2.