Posts

Posts uit april, 2015 tonen

SharePoint 2010 / SharePoint 2013 Fedauth and SessionID="True"

When you work with the fedauth cookie an issue might arise with the Size or information of the fedauth cookie. This could be the size of the cookie according to the information you put in to the claim or secondly the information itself in the cookie which might be sensitive (Privacy). Now you might be thinking, the fedauth isn't readable? Copy the information in the cookie in a basedecoder and you will be able to read the information that is put in the identifying claim. .. and some more stuff! According to a post published by Vittorio Bertocci you should be able to solve this by using the WIF functionality "IsSessionMode=True" and since SharePoint uses WIF..... (Windows Identity Foundation) We should be able to use this to in our SharePoint scenario's... Wrong ! We tried to get this to work (in various ways!) and quickly ran in to some strange situations wherein according to the post of Vittorio we should see it in action.  It just didn't work, then

SharePoint 2016 Release date around Q2 2016!

SharePoint 2016 is almost here.... I just wanted to share with you guys this important piece of news, SharePoint 2016 will be here in q2 of next year. The  http://blogs.office.com/2015/04/16/sharepoint-server-2016-update/ Public CTP's will probably arrive somewhere around Q1 2016 is my guess.

How to find a correlationID in SharePoint without an error?

Afbeelding
Sometimes we are looking for some piece of a request that fails in our SharePoint web application / site-collection / site.....And we are not getting that nice SharePoint error that gives us the correlation id which will help us narrow / pin down the error in the ULS logs. In case SharePoint isn't registering an error when your so called "exception" hits it can be difficult to find the culprit in ULS logs. So how then do we get the correlation id if don't get one? Simple, download the debugging proxy called "fiddler" from http://www.telerik.com/fiddler . Install fiddler on your client that you are using to debug / analyze the issue at hand. Remember that fiddler must be installed on a client with the necessary access to the sharepoint web application / site-collection / etc. Open up the fiddler client which will automatically integrate itself in to your browsers (firefox, IE, Chrome, etc.) as a proxy between your client and the SharePoint environment

One ADFS to serve them all (Part II)!

Afbeelding
Rewriting URL's for ADFS with SSO support. As stated in my previous post " One ADFS to serve them all!  (part I) " I'd supply you with a method that's necessary for rewriting you're ADFS host federation service name and still be able to keep SSO working with a custom vanity host name for your federation service name.  I'm going to assume you read my previous post to get acquainted with the basic requirements and other aspects of working with Microsoft Application Request and Routing module. If you're not acquainted with the subject matter were about to walk-through I'd recommend you read my first post which will walk you through a very the basic installation, and tell you a bit about the workings which i will skip in this post. One new component I am going to introduce is the web application proxy feature that's introduced in Windows Server 2012 R2. This feature was introduced to replace ADFS reverse proxy functionality and Microsoft's

One ADFS to serve them all (Part I)!

Afbeelding
One ADFS to serve them all (part I)! The goal is to use a vanity URL host names that your site is using and to also use that same host name to resolve ADFS, without having you redirected back to the ADFS original service name (hostname + URL). Because for the end users this shouldn't look like anything else but the vanity domain they are already connected to. Thus how do we solve this? Follow this basic lab entry to get a feeling for the end solution. (I will post more about this subject in greater detail) The ADFS Limitation. The limitation I'm speaking of, in this case is the endpoint for SAML 2.0 / WS-Federation: "/adfs/ls"  (but as you can imagine it's pretty much every endpoint listed in ADFS) We connect with the 1 possible value set during installation for the federation service name: "your.host.name"  Which results in all endpoints only being accessibly under that federation service name.    Figure A: Federation service