Hi!
We've got a working configuration of NAV 2009 R2 passed on from previous team with NST and DB-Tier run on the same server. We are trying to move NST to separate one. After creating all SPN mentioned in MS FAQ and setting up delegating permissions we have quite weird result. RTC runs fine on NST server. When run on any other machine (incl. DB-Tier) it shows the following error:
Microsoft Dynamics NAV
The login failed when connecting to SQL Server DBTIER.FQDN.NAME\SQL_INSTANCE_NAME.
OK
At the same time SQL server logs:
Login failed for user 'NT AUTHORITY\ANONYMOUS LOGON'. Reason: Could not find a login matching the name provided.
Any ideas?
Thank you in advance!
0
Answers
Network Service is a local account, if you're separating the SQL from the NST the permission given in SQL database to Network Service is no longer valid, as the Network Service on machine A is not the same as Network Service on machine B.
You need to add relevant permissions in you database to the your_domain\your_NST_server_name$ account
Slawek
Dynamics NAV, MS SQL Server, Wherescape RED;
PRINCE2 Practitioner - License GR657010572SG
GDPR Certified Data Protection Officer - PECB License DPCDPO1025070-2018-03
All services in question run with dedicated accounts, no NetworkService is used. We'd tried to grant same privileges and SPN to nav server computer account and switch to NetworkService - no changes occured then.
Here are current listings for setspn -L:
Registered ServicePrincipalNames for CN=NavServiceAccount:
DynamicsNAV/navserver.fqdn.name:7046
DynamicsNAV/navserver:7046
Registered ServicePrincipalNames for CN=SQLServiceAccount:
MSSQLSvc/sqlserver:5433
MSSQLSvc/sqlserver.fqdn.name:5433
Dynamics NAV, MS SQL Server, Wherescape RED;
PRINCE2 Practitioner - License GR657010572SG
GDPR Certified Data Protection Officer - PECB License DPCDPO1025070-2018-03
There is no difference between results of connecting via RTC with NavServiceAccount or my own credentials. The result seems to depend solely on computer running RTC.
P.S. I'm new to posting in this forum. Please excuse me if my Answers:No mark affects your profile. Let me know if it does. I was confused by "Answered" state of question.
Can you ask your AD admin to check if NavServiceAccount is trusted for delegation? Also please check if it is marked as Kerberos Only - you may want to untick that one.
Slawek
Dynamics NAV, MS SQL Server, Wherescape RED;
PRINCE2 Practitioner - License GR657010572SG
GDPR Certified Data Protection Officer - PECB License DPCDPO1025070-2018-03
Finally got the 3-Tier to work. I can't point exact action, here is the list of them:
1) Recreated SPN for NST - I believed that I either mistyped Service Principal Name or chosen wrong SPN (i.e. DynamicsNAV instead of instance-specific SPN).
2) Re-enabled Kerberos in delegation tab of NavServiceAccount and SQLServiceAccount and explicitly added corresponding SPNs.
3) Tried to run service with limited privileges as ordinary user - some guys on the Web mentioned this way to "purge Kerberos cache".
I will list most instance-specific configuration in details once I create pre-production environment (with WS and integration).