Options

Nav Three Tier Web Services - Port 88 open for Kerberos?

ScottJonesScottJones Member Posts: 44
edited 2011-11-25 in NAV Three Tier
Hi,

We have developed a three tier solution:

SQL NAV-Database <
\:D/
> Middle Tier Runing Web Services <
](*,)
> IIS7.0 Web Server running ASP.NET application (DMZ) <
](*,)
> WWW

The solution is using Kerbros and tickets.There is a firewall between the Middle Tier and the Web Server running ASP.NET application.

For the inital ticket creation do we need Port 88 on the firewall open? This is a large organisation and firewall re-confiuration is a slow process and by third party company.

If you look at this article http://itservices.stanford.edu/service/kerberos/firewalls it indicates port 88 needs to be open for Kerbros?

We sometimes get a situation where the ASP.NET application or IE running on the IIS Web Server cannot get to the NAV middle tier Web Services .WSDL and gives service not available. If we login using same credentials on middle tier it works and then it seems to work from the IIS Web Server.

The setup can work for days and then stops. There are three DC and I am wondering how the IIS7.0 Web Server Requests a Kerberos ticket from the DC if it cannot use Port 88 or am i still miss-understanding Kerbros?

Your thoughts would be appreciated :o)

Comments

  • Options
    ScottJonesScottJones Member Posts: 44
    Has any one else had issues like this? I'm still unsure if it is due to Port 88 not being open on the internal firewall...
  • Options
    ScottJonesScottJones Member Posts: 44
    Sorted, Thanks to a clue from Lars at Microsoft!

    Against the domain user the middle tier logs in as we changed the delegation from using 'Use Kerberos Only' to 'Use any authentication protocol' this uses something that networking people call "Protocol Transition" where you say that you allow any protocol until you reach the service and then delegation is done at the service level and authentication continues on Kerberos till it reaches the SQL Server.

    We've tested it here and rolled it out to the client and it seems to have resolved it.

    Any futher pointers would be appreciated if there are any Kerberos network guru's out there!!!
Sign In or Register to comment.