Configure Application Request Routing with Windows Authentication, Kerberos

This article has been moved to its new home here: https://benperk.github.io/msdn/2015/2015-08-configure-application-request-routing-with-windows-authentication-kerberos.html If you have not already read this article, please do which is a prequel to this one that explains the basic installation and configuration of ARR using anonymous authentication. The steps for configuring Application Request Routing (ARR) to use Windows Authentication -> Kerberos, are: Set…


Why am I getting this challenge response popup?

This article has been moved to its new home here: https://benperk.github.io/msdn/2015/2015-08-why-am-i-getting-this-challenge-response-popup.html Real quick, the reason for the credential pop-up is because the URL you are accessing is not in the Local Intranet trusted sites lists, as shown in Figure 6a and 6b! I setup a domain and did some learning on Kerberos. The first lessons I…


Library of tooling and guidance solutions (aka.ms/vsarsolutions)

This bog will be retired soon! Bookmark https://www.almdevopsrangers.org/solutions/ for future reference of ALM DevOps Ranger solutions. ****************************** A library of out-of-band tooling and practical guidance, extensions,  and community solutions, complementing our publications (aka.ms/vsarpublications). You can get information about new features and bug fixes included in the releases here. Extensions | Guidance and Tooling | Community Solutions…


Using TLS 1.2 with WCF

This article has been moved to it new home here:  https://benperk.github.io/msdn/2014/2014-11-using-tls-1-2-with-wcf.html NOTE: Security is a very serious topic and you should always engage an IT security expert before deploying an application that needs to be secure.  This article is intended to share my experience versus being an article to use as a guideline. With all the…


Microsoft SQL Replication Between Windows Azure Virtual Machines

Chris Skorlinski Microsoft SQL Server Escalation Services You can use SQL Server Replication technologies to move data between local on premises SQL Server to SQL Server running in Windows Azure Virtual Machines or between Windows Azure Virtual Machines.  Similar to move data between non-trusted corporate domains, keys are 1) use SQL Server Authentication and 2)…


Make your own SSL Certificate for testing and learning

This article has been moved to its new home here: https://benperk.github.io/msdn/2014/2014-05-make-your-own-ssl-certificate-for-testing-and-learning.html Like many technologies, they seem very complicated when you begin to work with it, but once you get into it you start to hit the boundaries of its capabilities and features.  Once you use a tool for some time you learn what it can and…


Secure channel compatibility support with SSL and TLS

This article has been moved to its new home here: https://benperk.github.io/msdn/2011/2011-10-secure-channel-compatibility-support-with-ssl-and-tls.html I wrote 2 previous blogs about NTLM and Negotiate/Kerberos which discussed briefly about how those authentication packages work within the context of Integrated Windows Authentication. Another authentication package supported in Windows is called Secure Channel, also known as Schannel.  This blog will not discuss…


Distribution Agent fails with “Could not remove directory” error

Distribution Agent fails with “Could not remove directory” error Sateesh Yele Microsoft SQL Server Support Symptom: The Distribution Clean up job fails with the following error. Executed as user: DomainnameUsername. Could not remove directory ‘C:Program FilesMicrosoft SQL ServerMSSQL10_50.MSSQLSERVERMSSQLReplDataunc’. Check the security context of xp_cmdshell and close other processes that may be accessing the directory. [SQLSTATE…


How I Explain Threat Modeling to Customers

Note: This article is updated at How I Explain Threat Modeling to Customers. Here’s my trying to explain threat modeling (actually core modeling) to a customer … My core theme of the modeling is this: Define what good looks like (e.g. objectives) Establish boundaries of good (constraints, goals — what can’t happen, what needs to happen,…


What Are You Optimizing

Note: This article is updated at What are You Optimizing? This is such a fundamental question.  It has an enormous impact on your product design and how you structure your product life cycle. For example, are you optimizing time? … money? … impact? … innovation? … resource utilization? If you don’t answer this question first,…