IIS provides a number of different authentication techniques. One of which is Integrated Windows Authentication. Integrated Windows Authentication utilizes Negotiate/Kerberos or NTLM to authenticate users based on an encrypted ticket/message passed between a browser and a server. The preceding image shows a standard communication flow between Internet Explorer and IIS version 6+. The initial request […]
Read More →Create an IIS configuration backup
The first step to take when making changes to a system is to backup what you currently have so that if there are problems with the system after the changes have applied, you have time constraints and can’t get the system to work, then you have at least a backup of the systems state to […]
Read More →Application Pool reset after installing 3rd party program
Understanding the differences between how and where 32bit and 64bit programs can run is, at the beginning, a little tricky. Simply, 32bit programs can run on 32bit and 64bit machines, while 64bit programs can only run on 64bit machines. When the topic concerns IIS application pools on 64bit machines, the context is the same. If […]
Read More →