Export (0) Print
Expand All
This topic has not yet been rated - Rate this topic

Configuring Authentication

 

Topic Last Modified: 2005-05-24

It is highly recommended that you use dual authentication, in which both front-end and back-end servers are configured to authenticate users. By default, front-end servers are configured to perform dual authentication.

However, if you have a locked-down perimeter network in which RPCs are not allowed across the intranet firewall, and it is impossible for the front-end server to authenticate users, you can use pass-through authentication.

noteNote:
When you use pass-through authentication, anonymous HTTP requests go directly to the back-end server where they are authenticated. You should use pass-through authentication only if the front-end server cannot authenticate users. For more information, see Scenarios for Deploying a Front-End and Back-End Topology.

For detailed instructions about how to configure authentication on a front-end server, see How to Configure Authentication on a Front-End Server.

 
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft. All rights reserved.