Set authentication mode to forms. And configure the MultiplexingRoleProvider and MultiplexingMembershipProvider. The attributes provider1, provider2 etc is in wich order they should be used. I guess you first want to authenicate with Windows, then AD and last SqlServer. The IIS security tab: "Enable anonymous acccess" is enough.
Sample from CMS 5 R2 where the ActiveDirectory providers are builtin:
<roleManager enabled="true" defaultProvider="MultiplexingRoleProvider" cacheRolesInCookie="true">
<add name="MultiplexingRoleProvider" type="EPiServer.Security.MultiplexingRoleProvider, EPiServer" provider1="WindowsRoleProvider" provider2="ActiveDirectoryRoleProvider" provider3="SqlServerRoleProvider" providerMap1="WindowsMembershipProvider" providerMap2="ActiveDirectoryMembershipProvider" providerMap3="SqlServermembershipProvider" />
<add name="WindowsRoleProvider" applicationName="EPiServerSample" type="EPiServer.Security.WindowsRoleProvider, EPiServer" />
<add name="SqlServerRoleProvider" connectionStringName="EPiServerDB" applicationName="EPiServerSample" type="System.Web.Security.SqlRoleProvider, System.Web, Version=188.8.131.52, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />
<membership defaultProvider="MultiplexingMembershipProvider" userIsOnlineTimeWindow="10">
<add name="MultiplexingMembershipProvider" type="EPiServer.Security.MultiplexingMembershipProvider, EPiServer" provider1="WindowsMembershipProvider" provider2="ActiveDirectoryMembershipProvider" provider3="SqlServermembershipProvider" />
<add name="WindowsMembershipProvider" type="EPiServer.Security.WindowsMembershipProvider, EPiServer" deletePrefix="BUILTIN\" searchByEmail="true" />
<add name="SqlServerMembershipProvider" type="System.Web.Security.SqlMembershipProvider, System.Web, Version=184.108.40.206, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" connectionStringName="EPiServerDB" requiresQuestionAndAnswer="false" applicationName="EPiServerSample" requiresUniqueEmail="true" passwordFormat="Hashed" maxInvalidPasswordAttempts="5" minRequiredPasswordLength="7" minRequiredNonalphanumericCharacters="0" passwordAttemptWindow="10" passwordStrengthRegularExpression="" />
type="System.Web.Security.ActiveDirectoryMembershipProvider, System.Web, Version=220.127.116.11, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a"
I have used the Multiplexing providers but I havent used the ActiveDirectory providers so I dont know how that should be configured.
Hope this helps
Thank you very much for your answer. I have managed to setup and got it working under Forms auth as you say, but to enable automatic login you must have it set to Windows auth (and Integrated auth in IIS) AFAIK.
If someone could post a working setup with integrated auth in IIS and AD, Windows and Sql role provider (in that order) in web.config that can autologin I would be very happy.
In EPiServer 4 this was very much possible, but in 5 now with ASP.NET auth mechanism I cant get it to work :/
As I see it this is not possible. If you have authentication mode windows the membershipproviders will never call "MembershipProvider.ValidateUser" because windows controls the authentication. You can use the WindowsRoleProvider with authentication mode Windows.
The SqlMembershipProvider requires forms authentication. I dont know about the ActiveDirectoryMembershipProvider.
But maybe someone else can explain it better.
I have quite a bit of problems to get the authentication to work properly in EPiServer 5. The goal is to have EPiServer configured so that it mainly authenticates with a local AD server. But we also want Sql and Windows role providers active as customer wants to be able to login with local accounts (sql) and local administrator (windows).
So to the question. How is this done in IIS and in web.config? I have tried to read the tech docs and forums on this topic but cant get it running as I want.
Some sample snippet from web.config would help a lot I think.
Right now, IIS is set to Integrated Authentication and <authentication mode="Windows" /> in web.config.
AD connection is setup properly as I have mapped the AD groups accordingly in edit mode. This was done with auth mode Forms in web.config, as when I switch to Windows auth mode, I get access denied exceptions.
If I dont add the attributeMapUsername="sAMAccoutName" attribute, I get other errors that user does not exists.
Any help is appreciated.