czuvich said:
We have turned on auditing, and it doesn't show the protocol
unfortunately. The issue happens randomly. Basically, we have an IIS
server and separate SQL server. At random (couple times a week), a user
will try to hit a database from a web page, and the NT Anonymous logon
error will occur. This error will persist until the client logs in and
out of their computer. No matter what application they get to, if it
hits a database, it will throw that error. IIS authenticates the user
fine. We are using delegation in a windows environment in asp.net. But
as I said it's very sporadic, but once it happens, that user is pretty
much locked out of our system until they log out and log into our
domain. Something tells me it's something to do with Kerberos and/or
the network. Can you shed some light on this? I have developed page
that is supposed to force the user to use Named Pipes and TCP/IP from
IIS to SQL, but the user still gets the same error no matter which
protocol is used. I specified the Network library in the connection
string. Thanks.
I don't know of a better way to see the protocol used. On the other hand,
since you're specifying Named Pipes, and still get the same error, then I
would suggest that the problem does not have to do with the protocol.
I would try to characterize the users who get these errors and the web pages
on which they get the errors. Does it only happen to a subset of users, or
on a subset of pages? If so, then what's unique about those users and/or
pages? I'd be looking for something which prevents those users, on those
pages, at those times, from properly authenticating. Therefore, no matter
how they connect, they are not authenticated and the SQL Server login fails.
Also, you may have said so, but do the login failures appear in the system
event log? In the SQL Server log file? Do those shed any light on the
situation?
John