Configure Forms Based Authentication (FBA) with SharePoint 2010
I got requests may times and I thought I should write the steps to configuration of FBA with SharePoint 2010. I have detailed the steps in this blog.
SharePoint 2010 supports FBA, Like WSS 3.0 or MOSS 2007. It's a feature of ASP .Net which we use with SharePoint. SharePoint 2010 you can create web applications using Classic Based Authentication or Claims based Authentication. However, FBA can only be configured with web applications created using Claims Based Authentication.
What are the differences between Classic Mode Authentication and Claims based Authentication?
Classic Mode Authentication: It refers to the integrated windows authentication. You cannot configure the Forms based authentication if your web application is using Classic Mode Authentication. You can convert a web application from Classic Mode Authentication to Claims Based Authentication. However, that can only be done using PowerShell commands and its an irreversible process. I have detailed steps to convert the web application from Classic Mode authentication to Claims Based Authentication.
Claims Based Authentication: SharePoint 2010 is built on Windows Identity Foundation. It enables authentication from windows as well as non-windows based systems. This also provides the capability to have multiple authentication in a single URL.
Configuration of FBA with SharePoint 2010 involves 4 major steps. The steps to configure the FBA with SQL membership Provider are below:
I> Create or Convert existing web applications to use Claims Based Authentication
II> Create User IDs in SQL Database
III> Modify web.config file
IV> Give Permissions to users present in SQL database
Note: If you want to configure FBA with LDAP membership Provider then you can refer TechNet article.
Please find the detailed steps below:
I> Create or Convert existing web applications to use Claims Based Authentication
Note: - Web Application has to be created from the Central Administration console or PowerShell, however it should be using Claims Based Authentication.
A. Creating web application using Central administration
-
-
- Open Central Administration Console.
- Click on Manage Web application Under Application Management.
- Click on new on the Ribbon.
- Chose Claims based Authentication From the top of the page.
- Choose the port no for the web application.
- Click on Enable Forms Based Authentication (FBA) Under Claims Authentication Types. Windows Authentication is enabled by default and if you dont need windows authentication then you need to remove the check the box.
- Add the Membership Provider & Role Manager Name
- As soon as web application has been created please verify the Authentication Provider settings for the web application. I have the screenshot below:
-
Note:- If you want to use Windows Authentication and Forms Based Authentication in Single URL then you have to select Enable Windows Authentication and Enable Forms Based Authentication.
Note:- Just for understanding, i am using Membership Provider as “SQL-MembershipProvider” and Role Manager as “SQL-RoleManager”. You can use different names, however you need to remember the name so that you can refer them in web.config files. These names are case sensitive.
B. What if you already have a Web application created using Classic Mode Authentication or How to convert Web application from Classic Mode authentication to Claims based Authentication?
You don’t have to delete that web application. You can convert that web application from classic mode authentication to claims based authentication. However this can only be done using PowerShell and it’s an irreversible process. Follow PowerShell commands to convert the web application from Classic Mode Authentication to Claims based Authentication:
$App = get-spwebapplication “URL”
$app.useclaimsauthentication = “True”
$app.Update()
Example:-
$App = get-spwebapplication “https://sp1:8000”
$app.useclaimsauthentication = “True”
$app.Update()
Once you have the web application using Claims Based Authentication, you can create a site collection. Now if you access the web application, you can access the site choosing Windows Authentication or Forms Based Authentication as shown in below image.
Choose windows authentication and login to site. When you login your currently logged in credentials will be used. Make sure the account you are logged in with has access to SharePoint site; Otherwise, you will get access denied error.
II> Configure the Membership Provider and Role Manager.
- On SharePoint 2010 server open the command prompt.
- Navigate to C:\Windows\Micrsooft .Net\Framework64\v2.0.50727
- Run “aspnet_regsql.exe”. This will open ASP .Net SQL Server Setup wizard. On this click on NEXT.
- Click on “Configure SQL Server for Application Services”.
- Specify the Database name. If you don’t specify the database name then it will create a database call aspnetdb.
- Use membershipseeder tool to create the users in SQL database. You can find the tool and information on that from codeplex.
Note:- I have specified the database name as “SQL-Auth”.
III> Modify the web.config file for Membership Provider and Role Manager.
We need to modify 3 different web.config files for FBA to work. Web.config of FBA Web application, web.config of Central Administration Site & Web.config of STS.
A. Modify web.config of FBA web application.
- Add connection String:
<connectionStrings>
<add name="SQLConnectionString" connectionString="data source=SQL;Integrated Security=SSPI;Initial Catalog=SQL-Auth" />
</connectionStrings>
Connection String has to be added after </SharePoint> and Before <system.web>
- Add membership Provider and Role Manager:
<roleManager defaultProvider="c" enabled="true" cacheRolesInCookie="false">
<providers>
<add name="c" type="Microsoft.SharePoint.Administration.Claims.SPClaimsAuthRoleProvider, Microsoft.SharePoint, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71e9bce111e9429c" />
<add connectionStringName="SQLConnectionString" applicationName="/" description="Stores and retrieves roles from SQL Server" name="SQL-RoleManager" type="System.Web.Security.SqlRoleProvider, System.Web, Version=2.0.3600.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />
</providers>
</roleManager>
<membership defaultProvider="i">
<providers>
<add name="i" type="Microsoft.SharePoint.Administration.Claims.SPClaimsAuthMembershipProvider, Microsoft.SharePoint, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71e9bce111e9429c" />
<add connectionStringName="SQLConnectionString" passwordAttemptWindow="5" enablePasswordRetrieval="false" enablePasswordReset="false" requiresQuestionAndAnswer="true" applicationName="/" requiresUniqueEmail="true" passwordFormat="Hashed" description="Stores and Retrieves membership data from SQL Server" name="SQL-MembershipProvider" type="System.Web.Security.SqlMembershipProvider, System.Web, Version=2.0.3600.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />
</providers>
</membership>
</system.web>
B. Modify web.config of the Central Administration web application.
- Add connection String:
<connectionStrings>
<add name="SQLConnectionString" connectionString="data source=SQL;Integrated Security=SSPI;Initial Catalog=SQL-Auth" />
</connectionStrings>
Connection String has to be added after </SharePoint> and before <system.web>
- Add membership Provider and Role Manager:
<roleManager defaultProvider="AspNetWindowsTokenRoleProvider" enabled="true" cacheRolesInCookie="false">
<providers>
<add connectionStringName="SQLConnectionString" applicationName="/" description="Stores and retrieves roles from SQL Server" name="SQL-RoleManager" type="System.Web.Security.SqlRoleProvider, System.Web, Version=2.0.3600.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />
</providers>
</roleManager>
<membership defaultProvider="SQL-MembershipProvider">
<providers>
<add connectionStringName="SQLConnectionString" passwordAttemptWindow="5" enablePasswordRetrieval="false" enablePasswordReset="false" requiresQuestionAndAnswer="true" applicationName="/" requiresUniqueEmail="true" passwordFormat="Hashed" description="Stores and Retrieves membership data from SQL Server" name="SQL-MembershipProvider" type="System.Web.Security.SqlMembershipProvider, System.Web, Version=2.0.3600.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />
</providers>
</membership>
C. Modify web.config of STS. You can locate the STS web.config from %programfiles%\common files\Microsoft Shared\web server extensions\14\WebServices\SecurityToken
<connectionStrings>
<add name="SQLConnectionString" connectionString="data source=SQL;Integrated Security=SSPI;Initial Catalog=SQL-Auth" />
</connectionStrings>
<system.web>
<roleManager defaultProvider="c" enabled="true" cacheRolesInCookie="false">
<providers>
<add name="c" type="Microsoft.SharePoint.Administration.Claims.SPClaimsAuthRoleProvider, Microsoft.SharePoint, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71e9bce111e9429c" />
<add connectionStringName="SQLConnectionString" applicationName="/" description="Stores and retrieves roles from SQL Server" name="SQL-RoleManager" type="System.Web.Security.SqlRoleProvider, System.Web, Version=2.0.3600.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />
</providers>
</roleManager>
<membership defaultProvider="i">
<providers>
<add name="i" type="Microsoft.SharePoint.Administration.Claims.SPClaimsAuthMembershipProvider, Microsoft.SharePoint, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71e9bce111e9429c" />
<add connectionStringName="SQLConnectionString" passwordAttemptWindow="5" enablePasswordRetrieval="false" enablePasswordReset="false" requiresQuestionAndAnswer="true" applicationName="/" requiresUniqueEmail="true" passwordFormat="Hashed" description="Stores and Retrieves membership data from SQL Server" name="SQL-MembershipProvider" type="System.Web.Security.SqlMembershipProvider, System.Web, Version=2.0.3600.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />
</providers>
</membership>
</system.web>
Above has to be added before </configuration>
IV> Give permissions to users in SQL database.
- Access Central Administration console and click on manage web applications under Application Management.
- Select the web application and click on user Policy on ribbon.
- Click on Add user and select Default Zone.
- Now type the user name, add the user to the web application by defining appropriate permission.
Common Issues:
If you are using multiple service accounts as per TechNet article Administrative and service accounts required for initial deployment (SharePoint Server 2010) then you might not able to resolve the usernames or add the users to the web application. If you are using 3 different accounts (Farm Administrator account, Application pool account for web application and service application account) then you need to make sure that you have access to the SQL membership database (SQL-Auth).
Important:
What happens to FBA when we upgrade WSS 3.0 / MOSS 2007 to SharePoint 2010?
Before upgrading to SharePoint 2010 you need to remove the changes you have done to the web.config file. As soon as the process of upgrading finishes all the web applications will be upgraded; however, those will use Classic Mode Authentication. You can convert those web applications from Classic Mode Authentication to Claims Based Authentication.
Comments
Anonymous
January 01, 2003
The comment has been removedAnonymous
January 01, 2003
The comment has been removedAnonymous
January 01, 2003
Nice Blog post. The steps are very clear and informative. ThanksAnonymous
July 26, 2010
If you want to use ready-made solutions for the management of FBA users, you should take a look here: www.devit.eu/.../121-fba-manager-sp2010-forms-based-authentication.aspxAnonymous
August 10, 2010
If you don't want to go through all those (tedious) steps, use a point-and-click solution and get advanced user management functionality for your extranet users, consider XtraShare for SharePoint: www.rl-soft.com/.../XtraShare_Presentation.pdf The current version supports 2007, but the 2010 version is coming soon!Anonymous
September 11, 2010
The comment has been removedAnonymous
September 14, 2010
Good detailed info on configuring FBA entry until the "Common Issues" paragraph. My search for FBA users returns nothing. Is there any way to troubleshoot this?Anonymous
September 16, 2010
Tim, the problem is that the membershipseeder may not have created a record in the aspnet_Membership table for the user despite creating one in the aspnet_Users table.Anonymous
September 22, 2010
Tim, Search FBA users...Are you refering to People Search or finding FBA users to give permission?Anonymous
September 28, 2010
An exception occurred when trying to issue security token: I am getting this error when followed the above steps.Anonymous
December 14, 2010
it's awesome ...great work it's work well in SharePoint 2010........thank uAnonymous
January 05, 2011
Is there a way to set the password so it doesn't require you to use a special character?Anonymous
January 24, 2011
Along Tim's thread I am also not able to have the user's show up in the user policy area to add them. It looks like the membership tables are fine and have the appropriate records added from the membershipseeder. Any other advice to get around the "Common Issue" ...my windows account is able to hit the aspnetdbAnonymous
January 24, 2011
Figured out why the users don't show up in the people picker the back way. First, if you enable windows authentication and forms authentication for your app then you should not use ntlm for windows..use Negotiate (kerberos). Second do the same for the SharePoint Central Admin site of using Negotiate (kerberos) Third, the people picker stuff also <PeoplePickerWildcards> in the web.config of your app and central admin has keys pointing to an aspnetmemebershipprovider..make sure its the right one....Fourth, I used donalconlon.wordpress.com/.../configuring-forms-base-authentication-for-sharepoint-2010-using-iis7 after bailing on this example. Fifth, I had to change the web config of the sharepoint web services root to match the security token service and had to set default role provider. All that finally got me going.Anonymous
February 15, 2011
Interesting. One of the features that worked well in SP2007 seems to have been nerfed. Extending an application in SharePoint 2007, I could enable the extended application for FBA, leaving my intranet application as windows authentication. What is the implication to domain users if w convert to claims based authentication?Anonymous
March 11, 2011
How do you manage users. Is there a webpart for SP2010?Anonymous
March 29, 2011
Got this working in the end, thanks for the blog. One thing worth noting. It's obvious in hindsight but I missed it for a while. In the web.config modification below, the data source need changing from SQL to your actual datasource. <add name="SQLConnectionString" connectionString="data source=SQL;Integrated Security=SSPI;Initial Catalog=SQL-Auth" />Anonymous
May 03, 2011
try: $app = get-spwebapplication “URL” $app.useclaimsauthentication = $true $app.Update() $app.ProvisionGlobally() $app.MigrateUsers($true)Anonymous
May 05, 2011
The comment has been removedAnonymous
May 05, 2011
Good Article.. Ping from kalashnikovtechnoblogs.blogspot.com/.../change-windows-authentication-to-form.htmlAnonymous
May 29, 2011
Hi, i have two moss 2007 sites. 1 is windows authentication and another one is form based authentication.. i configure search on both of these sites... but when i try to search any document (placed in same document library of both the sites) i am enable to find it in site having form based authentication.. will you please give me any suggestion to overcome this problem??? Thanks in advance....Anonymous
June 02, 2011
I found using these steps causes a problem for migrated user accounts, specifically the change of the web-application from Classic to Claims does not migrate the site fully resulting in some issues if for example you use Project Server 2010, where these steps will cause all Project webparts to fail with “An unknown error has occurred”! After a whole lot of investigation I found the problem was in the PowerShell command you used above: $webApp.UseClaimsAuthentication = "true" Far better to use the following: "Migrate from classic-mode to claims-based authentication from TechNet, this will migrate the existing site admin user correctly."
- technet.microsoft.com/.../gg251985.aspx Although after doing the above I did have to make the changes to the portalsuperuseraccount & portalsuperreaderaccount then also use Move-SPUser to migrate the remaining user accounts to their Claims based identities: E.g. instead of “DOMAINuser” now “i:0#.w|domainuser”. Hope this helps others out there! Martin
Anonymous
June 20, 2011
Helo Frnds i had done the form authentication through the below URL method weblogs.asp.net/.../configure-form-authentication-in-sharepoint-2010.aspx i had done all the things but my user is not able to access the site the error is below ( Error: Access Denied Current User You are currently signed in as: admin1 Sign in as a different user ) Please help me to resolve this error? Thanks in Advance..Anonymous
September 28, 2011
Hello frends, After doing all the steps..i got a homepage with 2 types of authentication. plz tell me how to set userid and pwd for users to login using FBA.Anonymous
October 17, 2011
Harshit, Erwabo.. I have the same problem. Farm account and ABA account both get access denied. there are no errors in event viewer logs and 14 logs.. I am running our of options. Both are added to site collection admin. Were you guys able to resolve the issue?Anonymous
October 19, 2011
<a href="http://j2me-aspnet.blogspot.com">really help me alot and save a day. Thanks</a>Anonymous
October 19, 2011
<a href="j2me-aspnet.blogspot.com/">really help me alot and save a day. Thanks</a>Anonymous
November 08, 2011
I tried this tutorial but as soon as make the modifications to Central Admin web.config I acan't acess "Manage web applications" link anymore. The login to Central Admin works but as soon I trye to get into "Manage web applications" it asks for userernam and password again. Re-entering my credentials doesn't work and I get a "Acces denied" page after 3-times. If I remove the provider from the central web.config then it works again. Any ideas?Anonymous
August 02, 2012
Nice post also read how to setup Forms Based Authentication using IIS csharpdotnetfreak.blogspot.com/.../sharepoint2010-forms-based-authentication-fba-claims.htmlAnonymous
August 30, 2012
If you have FBA setup and need a User Managing application: jasear.wordpress.com/.../sharepoint-2010-exaction-sql-user-managerAnonymous
September 21, 2012
Works great!! the only thing I had to do was give dbowner permission on the sql membership database to the account running the web app app poolAnonymous
December 25, 2013
Pingback from Technical: Microsoft – SharePoint – v2010 – Error Accessing User Web Application – Error – HTTP 404/ HTTP 200 | Daniel Adeniji's – Learning in the Open