In the navigation pane, point to Virtual Server Manager.
If the instance of Virtual Server that you want to manage appears in the list, click its name and skip to Step 6. Otherwise, follow Steps 4 and 5.
Click Switch Virtual Servers, and in Computer name, type the full computer name or IP address of the server running the instance of Virtual Server to manage.
To add this Virtual Server instance to the Virtual Server Manager list, select Add this computer name to the Virtual Server Manager list.
To perform this procedure, you must have the appropriate permissions. If you do not have the appropriate permissions, you will either receive an error message or you will not be able to view certain menu items and options described in this procedure. To change your permissions, contact your Virtual Server administrator. For more information, see Securing Virtual Server.
After completing this procedure, the Administration Website for this instance of Virtual Server appears.
For instructions on opening the Administration Website, see "Open the Administration Website" in Related Topics.
For this feature to work, you must do one of the following:
Configure constrained delegation on the domain controller, as described in "Configuring constrained delegation" in Related Topics. Note that constrained delegation is not supported when using Windows XP Professional as your host operating system.
In Internet Information Services (IIS), enable Basic authentication and disable Integrated Windows authentication on VirtualServer Websites for the current instance of Virtual Server as well as the one to manage. For more information about Virtual Server Manager, see "Selecting the Virtual Server instance to manage" in Related Topics.
By following these instructions, you are reducing the default security on the Virtual Server Web Application from Integrated Windows authentication to Basic authentication. Information that is exchanged with the server can be viewed by others on the network because Basic authentication results in data, including passwords, being transmitted over the network without data encryption. Someone attempting to compromise your system security could use a protocol analyzer to examine user passwords during the authentication process. This warning does not apply to HTTPS (or SSL) connections.