Sridhar's blog

SharePoint programming and customization.

Browse by Tags

Tagged Content List
  • Blog Post: BCS: Login failed for user ‘NT AUTHORITY\IUSR’

    Following my previous post , I just ran into another issue recently that I though I’ll write a post on so that it helps the community. So I created an external content type to perform CRUD operations against a test table in a test database.  Saved that ECT (and so the model) to the BCS service application...
  • Blog Post: Tracing SharePoint 2010 Service Applications

    If you are interested (as I was) to know what happens behind the scenes in a SharePoint 2010 Service Application, there’s a very neat way to do this.  I had a specific scenario where I had to understand what happens in the back-end of BCS service application I provisioned, so I’ll use that example...
  • Blog Post: BCS and External List Learning – Part3

    Check out previous posts on the same topic: Part1 Part2 Case where an external content type created did not show up in the external content type picker control.  This case was amazing as we (me and the customer) found the cause while on call! The problem statement was simple! We create an external...
  • Blog Post: BCS and External List Learning – Part2

    In Part1 , I covered a specific scenario related to viewing external list and BDC throttling settings.  In this post, I’ll cover a similar specific scenario but related to authentication. When we create an external content type using SPD2010, the screen where we specify the data source information...
  • Blog Post: BCS and External List Learning – Part1

    I am posting this article split into series covering specific BCS learning when working with customers.  In this post, I’ll cover a specific scenario where when browsing to an external list we might see the following error.   In most cases, this would be because of default throttling limit...
  • Blog Post: Setting up BCS with Secure Store Application impersonation

    We used to perform SSO impersonation in BDC in MOSS 2007.  We now have a secure store service application that allows us to specify types of target applications to use for impersonating specific services including BCS.  Here’s a walk-through I wrote for one of my customer to setup secure store...
Page 1 of 1 (6 items)