• About

Information Dynamics

Information Dynamics

Category Archives: CRM2015

Failure to access CRM Organization URL with FQDN on the server

18 Wednesday Sep 2019

Posted by GIRISH SRINIVASA in CRM 2011, CRM2013, CRM2015, CRM2016, Dynamics 365, Dynamics CE 9, Uncategorized

≈ Leave a comment

After installing CRM platform and changing the web address from Deployment Manager console as per below

DisableLoopBack

It will not be possible to browse the Organization created from Deployment Manager and the event viewer will record “Event 4625 Audit Failure NULL SID failed network logons..” this is because of LoopbackCheck feature of the Windows Server that prevents IIS sites being accessed using FQDN in the URL. Run the following PS command to disable the loopback check

New-ItemProperty HKLM:\System\CurrentControlSet\Control\Lsa -Name “DisableLoopbackCheck” -value “1” -PropertyType dword

Also check that the CRM application pool account has the correct SPN set as an example for FQDN crm.idynamics.dev the SPN for app pool account will be

DisableLoopBack1

 

 

Defining GPO for Dynamics 365

10 Saturday Feb 2018

Posted by GIRISH SRINIVASA in CRM2015, CRM2016, Dynamics 365

≈ 4 Comments

Tags

Dynamics 365, GPO

To install Dynamics 365 platform it is a good practice to have a well-defined Organization Unit (OU) in the Active Directory domain. The different OU’s  that can be created in AD structure include the following:

 

  • Service Accounts : Listing the various service accounts that will be used for the various CRM platform roles, SQL Server, SSRS, Active Directory Federation Services (ADFS) etc.
  • Groups: This will have all of the four groups viz., PrivReportingGroup, PrivUserGroup, ReportingGroup, SqlAccessGroup that are part of the CRM platform
  • LocalAdmin: This will contain groups that will assign LocalAdmin and SysAdmin permissions to the servers.
  • RestrictedGroups: This will contain groups that will assing LogonAsService, LogonAsBatch, ImpersonateClient, PerformanceLogUsers.
  • Servers: Contains the list of servers where the GPO will be applied

With the above requirements, the AD OU group(s) structure in test domain idynamics.dev is as per below:

Capture1

 

Capture2
Capture3
Capture4

Service Account(s) for CRM platform defined as per below:

Capture5.png

With above structure in place we will now go ahead and create Group Policy Objects required:

  • Open Group Policy Management editorCapture6
  • Create a DB Admin GPO purpose is to have Administrator permissions on SQL Server

Right-click on Group Policy Objects > New and enter the following

Capture7

Now we will associate CRM-DEV-SQL-Administrator group to this GPO to have Administrator permission on the server DEV-CRM.

Right-click on DB Admin GPO and bring up the Edit dialogue window

Capture8

Navigate to Computer Configuration > Policies> Windows Settings > Security Settings> Restricted > Add Group and add CRM-DEV-SQL-Administrator.  Configure membership as per the following:

Capture9

Capture10.png

Now that the GPO is defined we will link the above to the computers listed under Server OU

Capture11

In the Group Policy Management editor right-click on server and Link to an existing GPO

Capture12

Capture13

Now logon to the server DEV-CRM and the CRM-DEV-SQL-Administrator group should be published through GPO in the Local Administrator group

Capture14

Following similar steps create additional GPO’s as per the following table:

Capture15

Capture16.png

Claims Based Authentication error in building certificate chain for RP

19 Friday Aug 2016

Posted by GIRISH SRINIVASA in CRM2015, CRM2016

≈ Leave a comment

When Dynamics CRM platform is configured for claims based access, the following error will be recorded in ADFS event log.

 

CertificateChainError.png

Open PowerShell command window and type in Get-AdfsRelyingPartyTrust -Name [RP Name]

RelyingPartyTrustProperties.png

The properties EncryptionCertificateRevocationCheck and SiginingCertificateRevocationCheck should be set to none by running the following commands, CRM in the commands below is the name of he Replying Party Trust set up in ADFS which will change according how RP is set up.:

Set-AdfsRelyingPartyTrust -TargetName CRM -EncryptionCertificateRevocationCheck None

Set-AdfsRelyingPartyTrust -TargetName CRM -SigningCertificateRevocationCheck None

 

RelyingPartyTrustPropertiesSet

CRM 2015 Solution ER Diagram

31 Sunday Jan 2016

Posted by GIRISH SRINIVASA in CRM2015

≈ Leave a comment

As part of CRM implementation if you need to see the ER diagram for the various entities used in custom solution download the ER diagram generator tool here

Claims Authentication and CRL check ADFS

26 Tuesday Jan 2016

Posted by GIRISH SRINIVASA in CRM2015

≈ Leave a comment

After configuring CBA (claims-based authentication) for CRM 2015 if you get the following error while browsing to the organization:

Screen21

 

Run the following power shell command to set the CRL (Certificate Revocation List) check to none and then the claims from ADFS should flow through to enable browsing to the organization.

 

Screen22

Step 2 – Configuring CRM to use Claims Based Authentication

21 Saturday Nov 2015

Posted by GIRISH SRINIVASA in CRM2015

≈ 2 Comments

In Step1 we looked at configuring the CRM platform with the aid of Deployment Manager GUI to enable claims based authentication. In this post we will look at the steps involved in configuring Relying Party trust in AD FS. Microsoft has provided a detailed guide here. I did find some issues while configuring the claims rule set and will highlight it as we walk through the steps.

  1. Create rule for Claims provider trust (Active Directory) for UPN

Capture1

Right click choose Edit Claims and then “Add Rule..” in the dialog box

Capture1.1

Capture3

Capture4

Click Finish to add this Rule, the Acceptance Transform Rules looks like

Capture2

 

2. Create Relying Party trust, choose Relying Party Trust in the AD FS Management console.

RPConfigure1

RPConfigure2

RPConfigure3

RPConfigure4

RPConfigure5

RPConfigure6

RPConfigure8

Once the above steps are completed the Edit Claims Rules dialog box opens up where we configure the Rules.

RPConfigure9

 

 

RPConfigure10

RPConfigure11

RPConfigure12

RPConfigure13

RPConfigure14.1

Edit Global Primary Authentication policy to enable Forms Based Authentication.

 

AuthenticationPolicy

Once the above steps are completed go DEV-WFE01 and try accessing the CRM organization I have set up an org called ACM. (could be any name)

https://xrm.dev.local/ACM comes up with the following:

SigningToSts

This will redirect to:

https://sts.dev.local/adfs/ls/wia?wa=wsignin1.0&wtrealm=https%3a%2f%2fxrm.dev.local%2f&wctx=rm%3d1%26id%3dc68e12fd-17d4-4b11-aa86-1cd38f8c1784%26ru%3d%252fACM%252fdefault.aspx&wct=2015-11-22T19%3a12%3a23Z&wauth=urn%3afederation%3aauthentication%3awindows

and once successful will display the main page of CRM Organization:

 

 

SuccessfulSigningToSts

This completes configuring claims based authentication for Dynamics CRM platform

 

 

 

Steps for Configuring CRM to use claims-based authentication

21 Saturday Nov 2015

Posted by GIRISH SRINIVASA in CRM2015, CRM2016

≈ Leave a comment

In the article there is description of how claims based authentication works in the context of CRM platform. In this post I will details the steps involved to get this working for the deployment scenario as shown here. The detailed information will be split into posts viz., Step 1 & Step2

Pre-Requisites:

  1. Setup and configure Active Directory Fedaration Services (AD FS) on Windows Server 2012 R2 and the steps involved are described here
  2. Enabled CRM platform for Claim-based Authentication and this is done through Deployment Manager. The steps are detailed below with the a series of screen snap shots.
  3. Set up Relying-Party trust in AD FS
  • Open Deployment Manager GUI and the summary screen will indicate whether claims-based authentication is enabled/disabled.

Screen1

  • Click on Configure Claims-Based Authentication and if the access point is not set to use HTTPS the following will be displayed

Screen2

  • Click on Action > Properties and enter the following settings

Screen4

  • Now click on Configure Claims-Based Authentication

Screen5

Screen6

Screen7

Screen8

Screen9

Screen10

Screen11

  • Click on View the log file to make note of the url that needs to be added to the Relying Party trust in the AD FS management console.

Screen12

Things to Check:

By default the CRM platform set up does not configure the web site for SSL. This step needs to done manually.

Screen20

Once the above steps are completed. You need to ensure that browsing to the Internal Federation Metadata URL as indicated above returns content without any errors. If the following error is displayed then the cause will be missing read permissions for the private key on the certificate.

XRMPrivateKeyNoPermissionResolution: Open MMC and assign read permissions to service account used for the certificate in use.

XRMPrivateKeyPermission

Once the internal federation metadata URL loads the XML data without any errors the expected Claims set from ADFS is listed as below and while configuring ADFS the outgoing claims will be upn,name and primarysid

ClaimSet

SQL Server Deployment Considerations

27 Tuesday Oct 2015

Posted by GIRISH SRINIVASA in CRM2015

≈ Leave a comment

The following are the guidelines specific to SQL Server instance to be used for CRM 2015 platform:

  • Don’t modify system tables on the SQL instance where Dynamics CRM is to be deployed.
  • Full-text indexing must be installed.
  • CRM organization databases have auto growth setting of 256MB. For intensive database transactions increase the auto growth value to improve performance.
  • Set Max degree of parallelism to 1 in SQL Server to improve the overall application performance on multiprocessor systems.

Dynamics CRM platform creates two databases:

  • MSCRM_CONFIG: Contains the CRM metadata, such as configuration and location information specific to each organization database.
  • OrganizationName_MSCRM: The main organization database where CRM data is stored viz., entity (aka table) records, activities etc. There will be several of these organization databases depending on the number of the organizations setup using CRM Deployment Manager.

SQL Server Connection & SSRS:

  • Dynamics CRM connection to SQL Server is only via Windows Authentication.
  • Dynamics CRM Reporting Extensions are data processing extensions and are installed on the Microsoft SQL Server Reporting Services server. Two data processing extensions: Fetch data processing extension for Fetch-based reports and SQL data processing extensions.
  • The identity account running the instance of Microsoft SQL Server Reporting Services must be added to PrivReportingGroup AD security group.
  • Separate deployments of Microsoft Dynamics CRM cannot share one SQL Server Reporting Services server. But a single deployment of Microsoft Dynamics CRM can use the same SQL Server Reporting servers.

Issues and Limitations of Claim-based authentication when used with Dynamics CRM

20 Tuesday Oct 2015

Posted by GIRISH SRINIVASA in ADFS, ADFS 4.0, CRM2015, CRM2016, Dynamics 365, Dynamics CE 9

≈ Leave a comment

The following are some of the limitations of accessing Dynamics CRM platform using Claims-based authentication

  • Dynamics CRM does not enforce strong password policy and this task is handled by AD.
  • ADFS federation server sessions are valid up to 8 hours for deactivated or deleted users. The ADFS server tokens allocated to a web single sign-on (SSO) have cookie expiration of 8 hours. Therefore even when a user is deactivated or deleted from authentication provider as long as the user session is still active the user can continue to be authenticated to access resources.
  • Certificates created using the CNG key template are incompatible with Microsoft Dynamics CRM.
  • CRMAppPool account used for Dynamics CRM website must have read permission to the private key or encryption certificate.

Work around option(s):

  1. Disable the user in Dynamics CRM and AD.
  2. Reduce the ADFS token life time. (Power Shell). In ADFS 4.0 on Server 2016 TokenLifetime is replaced with SsoLifeTime and default is set to 480

 New Picture

Configuration of CRM for IFD using Claims-Based Authentication

20 Tuesday Oct 2015

Posted by GIRISH SRINIVASA in CRM2015

≈ Leave a comment

For Internal Access

New Picture

  1. The client sends a request to access the Dynamics CRM website.
  2. IIS refuses the connection and sends a HTTP 302 and redirect to ADFS
  3. The client sends a request for a security token to ADFS
  4. ADFS returns a HTTP 401.1 error indicating the client must supply a Kerberos ticket
  5. The client sends an Kerberos Authentication request to Active Directory
  6. Active Directory validates the client and sends a Kerberos ticket
  7. The client sends a request for security token to ADFS along with the Kerberos ticket.

Typically for internal access the Client logons to internal domain example mydomain.com and is already validated by Active Directory and hence the Kerberos ticket is already available so steps 4 through to 7 are skipped.

  1. ADFS provides a security token containing claims for providing access to CRM data
  2. The client sends the security token containing claims as obtained from ADFS to CRM server
  3. The CRM server decrypts and validates the security token and presents the user with the information.

For External Access

New Picture

The flow is similar to Internal Access with the exception of the following:

  • The Client will not be logging onto the domain directly and hence there is no Kerberos ticket.
  • The ADFS will present the client a logon page to select a attribute store at which point they enter the credentials which are then validated against Active Directory.
← Older posts

Subscribe

  • Entries (RSS)
  • Comments (RSS)

Archives

  • November 2021
  • August 2021
  • July 2021
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • March 2019
  • September 2018
  • February 2018
  • January 2018
  • December 2017
  • January 2017
  • August 2016
  • January 2016
  • November 2015
  • October 2015
  • September 2015
  • November 2014
  • October 2014
  • September 2014
  • July 2014

Categories

  • ADCS
  • ADFS
  • ADFS 4.0
  • ASP.NET Core
  • Azure
  • Azure AD
  • Azure AD DS
  • Azure B2C
  • CRM 2011
  • CRM2013
  • CRM2015
  • CRM2016
  • Docker
  • Dynamics 365
  • Dynamics 365 CE Online
  • Dynamics 365 Portals
  • Dynamics CE 9
  • Knockout and TypeScript
  • OAuth2.0/OpenIDConnect
  • Power Platform
  • PowerApps
  • PowerShell
  • SharePoint 2019
  • Spkl
  • Uncategorized
  • WebAPI
  • Windows Server 2012
  • Windows Server 2016

Meta

  • Register
  • Log in

Blog at WordPress.com.

  • Follow Following
    • Information Dynamics
    • Already have a WordPress.com account? Log in now.
    • Information Dynamics
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...