Troubleshooting LDAP/AD Integration
  • 11 Jul 2022
  • 3 Minutes to read
  • Dark
    Light
  • PDF

Troubleshooting LDAP/AD Integration

  • Dark
    Light
  • PDF

Locked out: Resetting the built-in user directory and Admin account

See restoring the built-in user account for instructions on how to reset the Admin account to the password Admin.

The Active Directory (New) user directory is not found/not selectable

The Active Directory (New) user directory is loaded from the InedoCore extension. Visit the extensions page (Administration › Extensions) to verify that the InedoCore extension is loaded on that page.

An instance of the user directory should be visible on the Manage User Directories page (Administration › Change User Directory › Advanced). If there isn't one (e.g. after a reset), click the Add User Directory button and select Active Directory (New). Configure the user directory as detailed in the Advanced Configuration section, and then click Save. This will restore the user directory on the Change User Directory page.

Privileges assigned to the Domain Users group not working

The Active Directory (New) directory only considers a user's direct group membership, not indirect membership (i.e. a group's groups). This is done for performance reasons, as such queries are recursive in nature and may have severe performance issues (particularly with multiple domains).

We have had many support inquiries related to the assignment of privileges to the Domain Users group, and privileges not cascading to every user. We do not recommend using this group as a catch-all to grant or restrict any privileges. Refer to Virtual Privilege Assignment to configure catch-all privileges.

Integrated Authentication Not Working

The underlying mechanisms for Integrated Windows Authentication are handled at the HTTP.SYS layer, which our products do not, nor cannot, access. Our code simply looks for a server variable named LOGON_USER, which is added by the web server (IIS or IIS components we use in the self-hosted version). When you enable Integrated Windows Authentication in our products, users will be automatically logged in if the LOGON_USER variable is present.

Undersatnding this mechanism will help troubleshoot when it goes wrong, but we've also put together some tips from our users about what they've found works.

Behind The Scenes: Integrated Windows Authentication

Integrated Windows Authentication is a very complicated mechanism that requires a properly configured client, server, and domain. To summarize the most common IWA set-up (Kerberos Authentication):

  • The web server sends a 401 (unauthorized) response with a specially encrypted HTTP response header
  • The web browser decrypts the header, and sends another request with a special token indicating the user name as a HTTP request header
  • The web server reads this header and contacts the domain controller to verify the client token
  • The web server adds the LOGON_USER variable, strips out the special client token, and sends the modified request to the application software (ProGet, BuildMaster, or Otter) for processing

A lot of things can go wrong in this chain, and describing how to troubleshoot and set-up your network is well beyond the scope of this document and our support. But fortunately, since it’s not at all related to our products, there are a myriad of resources for helping debug this; just search Integrated Windows Authentication not working.

TIP: Add BackConnectionHostNames for same-server or self connections

Integrated Windows Authentication often doesn't work when you're doing a same-server connection. For example: browsing to BuildMaster from a browser on your BuildMaster server, using a connector in ProGet to connect to itself, etc.

Setting the BackConnectionHostNames registry value may help!

  1. In Registry Editor, locate and then click the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0
  2. Right-click MSV1_0, point to New, and then click Multi-String Value.
  3. Type BackConnectionHostNames, and then press ENTER.
  4. Right-click BackConnectionHostNames, and then click Modify.
  5. In the Value data box, type the host names for the sites that are on the local computer (e.g. proget.kramerica.local), one per line, and then click OK.
  6. Restart machine

TIP: Setup a Second site in IIS

Many clients will never support Integrated Windows Authentication, which means they will never be able to connect to your instance. To around this, you can create a second site in IIS that doesn't have Integrated Windows Authentication configured; this will require a different hostname and/or port.

TIP: Configure a Service Principal Name

You may need to configure a Service Principal Name; Windows is supposed to do this automatically for you when you set up a DNS name, but you may need to use the setspn tool.


Was this article helpful?