Jack of all that is Microsoft, Master of None

July 24, 2008

Got Long MOSS Service Account Names?

Are you planning on creating and using some long-named MOSS service accounts?  Maybe something like TestMOSSMySiteAdmin01 or TestMOSSSSPAppPool01?  Well if you do, then take note – I’ve had two separate occasions where I have an AD account with more than 20 characters as the username, and MOSS isn’t happy about it.  I ran across this a while ago at a client site and thought it was something wrong with their environment, and let it slide… but my buddy and fellow B&R colleague Mr. Bob Fox ran into this yesterday, and was quite surprised that this happens.

So here’s the deal…

You’ve got your account, ‘TestMOSSMySiteAdmin01’ – you go and create it in Active Directory, typically by just specifying the Full Name & User Logon Name, and your screen looks something like this:

 

 

 

 

 

 

 

 

 

 

 

 

 

Notice a couple of things here:

§  The user logon name is exactly what I want – the full account name.

§  But the ‘User Logon Name (per-Windows 2000) has been truncated by one character (character #21)

So now we hop over to our MOSS environment, as we want to bring up a new Web Application for our MySites, and use this account.  We run through the typical web app setup, and specify the full username:

 

 

 

 

 

But when we submit this information, we get a username/password combination error:

 

 

Event thought I’ve entered everything correctly. 

So after ripping my hair out, this is where the Active Directory account’s User logon name (pre-Windows 2000) comes into play.  From what I can tell, this is what MOSS is using when you input a username – so in this case, I have to truncate the name of my service account in the web application setup form:

 

Notice that I had to cut off the last number – to match what AD was showing.  Now, when I submit this, my web application gets created properly.  And to verify that it took the shortened name, I open up IIS, and voila – using the truncated account logon name:

 

 

 

And while I’m running Server 2008 with IIS7, I have confirmed this is the same on Server 2003 with IIS6. 

So in the end, the moral of the blog post is that whenever you can, keep your service account names to under 20 characters.  If you can’t beware of this issue.

-Chris

Technorati Tags:
, , , ,

April 16, 2008

Web Content Management – Allow reviewers to see drafts and nothing else

Scenario:

You have a public-facing site with WCM/Publishing enabled.  Active Directory authentication is used for your content creators, editors & approvers.  Your anonymous users can browse most portions of the site without logging in, however, there are some areas where they login using forms-based authentication.

Your pages are constantly undegoing changes, and you need to create an account that has access to review the draft version of pages, however, you do not want them to see the Site Actions button or the Page Editing Toolbar, or have the ability to create any new content.  Essentially, they are the most basic of content reviewers – the only ‘elevated permissions’ they have over an FBA user is that when they browse the site, they see the latest draft of every page, instead of the latest published version.

The Typical Solution

So in most situations, you would turn content approval on within your page libraries, and then add this user to the <SITE> Members SharePoint group, where they would be granted contributor rights, and could review the page drafts.  They would be able to edit the drafts, but since content approval is turned on, anything they modify won’t go anywhere without approval.  But they are contributors, and can create new content (that they cannot publish), and they still have access to the Site Actions menu, even if the functionality available to them is significantly limited.  In the majority of cases though, this setup works exactly as needed for most organizations.

Our Scenario’s Solution

In our case, we need to create a new Permission Level:

1.  Browse to Site Actions -> Site Settings -> Modify all Site Settings -> Advanced Permissions.

2.  Click Settings -> Permission Levels.

3.  Click on the actual ‘Contribute’ link.

4.  You will now be presented with a page listing all of the permissions for contributors.  We want to make a copy of this permissions set, and then modify the new permission level.  Scroll down to the bottom of the page and click on Copy Permission Level.

5.  A new page will appear where we can now customize our new permission level.  Give this level the name of Draft Reviewers, or whatever you see fit.

6.  Then, make sure only the boxes checked in the images below are checked on your page.  This will ensure that any users granted this Draft Reviewers permissions level will be able to see drafts but not do anything else ‘elevated’ within the site.  Once you have checked (and double checked) your settings, click Okay.

7.   Once the permission levels has been created, go back to Permissions in your breadcrumb.

8.   Now we need to create the SharePoint group that will hold these Draft Reviewers and also assign them the permissions set we just created.  Click on New -> SharePoint Group.

9.  Give your group a name (such as Draft Reviewers) and then make sure you check the box next to the new permission level we just created:

10.  Click Okay – and congratulations, your new group is created with the proper permission based on the scenario above.  Now, add your users to the group, and when they log into the site, they will see all of the pages in draft form, but perform any other type of content management process or administrator function.

 Technorati Tags:
, , , , , , ,

Create a free website or blog at WordPress.com.