When optimizing and tuning an ASP.NET application you may want to increase the value of the requestQueueLimit. The requestQueueLimit is the maximum number of requests that can be queued by an ASP.NET process before errors get returned to the client. Modify Request Queue Limit within the Aspnet.config Below, the requestQueueLimit is configured in the Aspnet.config […]
Read More →Author: Benjamin Perkins
Secure channel compatibility support with SSL and TLS
I wrote 2 previous blogs about NTLM and Negotiate/Kerberos which discussed briefly about how those authentication packages work within the context of Integrated Windows Authentication. Another authentication package supported in Windows is called Secure Channel, also known as Schannel. This blog will not discuss the details of Schannel because the detail can be found here. […]
Read More →NHibernate and Entity Framework essentials using a Model First approach
Object Relational Mapping technologies have been around for many years. Hibernate was one of the first, if not the first, ORM library which targeted the Java platform. Today, there are also NHibernate, which is a port of Hibernate to C# and the ADO.NET Entity Framework. Being a huge fan of the concept I am passionate […]
Read More →Kerberos authPersistNonNTLM authentication, request based vs. session based authentication
Kerberos is a request based authentication protocol. That means with each request, there is a resulting authentication step. See the following figure 1 where you notice a Ticket request for each GET Http Command. Figure 1, Network Monitor log for request based authentication This article covers the implementation of the authPersistNonNTLM attribute, that when set […]
Read More →NHibernate and Entity Framework
Prior to getting my job here at Microsoft, I was, and in many aspects still am passionate about NHibernate. I discovered a particular liking to ORM’s in general. I liked it so much that I wrote a book called “Working with NHibernate 3.0” which is available on Amazon or from the Wrox.com website. What I […]
Read More →Integrated Windows Authentication with NTLM
IIS provides a number of different authentication techniques. One of which is Integrated Windows Authentication. Integrated Windows Authentication utilizes Negotiate/Kerberos or NTLM to authenticate users based on an encrypted ticket/message passed between a browser and a server. The preceding image shows a standard communication flow between Internet Explorer and IIS version 6+. The initial request […]
Read More →Integrated Windows Authentication with Negotiate
IIS provides a number of different authentication techniques. One of which is Integrated Windows Authentication. Integrated Windows Authentication utilizes Negotiate/Kerberos or NTLM to authenticate users based on an encrypted ticket/message passed between a browser and a server. The preceding image shows a standard communication flow between Internet Explorer and IIS version 6+. The initial request […]
Read More →Create an IIS configuration backup
The first step to take when making changes to a system is to backup what you currently have so that if there are problems with the system after the changes have applied, you have time constraints and can’t get the system to work, then you have at least a backup of the systems state to […]
Read More →Application Pool reset after installing 3rd party program
Understanding the differences between how and where 32bit and 64bit programs can run is, at the beginning, a little tricky. Simply, 32bit programs can run on 32bit and 64bit machines, while 64bit programs can only run on 64bit machines. When the topic concerns IIS application pools on 64bit machines, the context is the same. If […]
Read More →