April 2016 Update: This article explains all of the manual configuration steps you would work through for setting up Forms Based Authentication for a web application in SharePoint 2013 (primarily for an extranet, but would be similar for an intranet).
For an extranet web application, a new automated solution is now available as well - the Extranet Setup Wizard of Extranet Collaboration Manager 2013 R2.
In this article, I will give a step-by-step walk through of the process for configuring SharePoint Forms Based Authentication “out of the box” without an add-on such as Extranet Collaboration Manager (ExCM). Doing this will allow us to see both the similarities and differences between SharePoint 2010 and 2013 as well as highlight the limitations of a “basic” SharePoint FBA web application that can be overcome with a professional-grade add-on like ExCM.
Note: for configuring forms based authentication in SharePoint 2016, go here.
One of the most obvious differences between SharePoint 2010 and the 2013 is that Claims Authentication is the ONLY authentication method available in the User Interface (UI) within Central Administration. If necessary, you can still use PowerShell to create a Web App in “classic” mode. However, Windows Authentication is the only method enabled by default…meaning that if you just created a new Web Application with all the default settings, you would basically have a site that only uses Windows Authentication. So in terms of functionality, it’s very similar to the “classic” authentication in earlier versions.
In the screenshots below, you can see the changes we need to make to begin configuring FBA:
In the second screenshot, notice that I have used
the “best practices” of assigning a dedicated service account as my Application
Pool Identity, as well as renaming my content database from the default cryptic
string of characters to one more concise and descriptive.
You may also be interested in:
Finally, I want to mention the very last setting
on this screen:
I speak with customers all the time who always
answer “no” to this option. As a matter of fact, I used to do it myself not
only with SharePoint but in all the applications I managed as a Network
Administrator. However, at last year’s SharePoint Conference I attended a
session and the speakers specifically brought up an instance where they had
visited the Microsoft campus and were shown THOUSANDS of bug fixes and
performance improvements in SharePoint 2010 that were generated solely by the
“Customer Experience Improvement Program.” Most of them were very minor, but
the cumulative effect of all those improvements was significant. Since then, I
ALWAYS answer “yes” to this option and urge our customers to do the same.
Now that we have created a new Web Application
with dual authentication, let’s navigate to the site and see what it looks
like:
As you can see, it is very similar to the 2010
default sign in page, and still requires us to choose our authentication method before
continuing any further.
Now that our site is up and running, it’s time to
decide on a Membership Provider and make the appropriate edits to our
web.config files. For this post, I am going to use the SQL Membership Provider
for a couple of reasons. First, it is a more secure way to store external users
than Active Directory. Second, since we recommend using SQL with Extranet Collaboration Manager for SharePoint 2010, I thought it
would be a nice way to show you the limitations of the SQL Membership Provider
with default settings and how ExCM improves upon them.
First, we need to create our SQL database.
SharePoint 2013 uses version 4.0 of the .NET Framework, so we need to use the
corresponding “asp_reqsql” application to ensure compatibility and create the
proper database structure needed to store information for ASP.NET membership,
profiles, and roles. You can find the utility in the following location:
Once we launch it, we see the following screens:
In the following screen, we need to specify both
our SQL Server name (and instance if applicable), as well as the name for our
FBA database. We can simply type directly over the “<default>” name that
initially appears. In my case, SQL is installed on this local box and I have
chosen to call my database “ExtranetDirectory:”
Now we can just continue clicking “Next” and then
“Finish” until we see this screen:
Now that we have created our database, we need to
grant the appropriate access to the App Pool Identities for both the STS and
Content Sites. We know that we are using the “SVC_SPAppPool” for our Content
Site because we chose it when creating our Web Application. In some cases, we
may be using the same account for all Application Pools, but that’s not always
the case. To double-check, we need to open up IIS Manager and the click on
“Application Pools:”
As we can see, “AWBIKES\Administrator” is being
used for the STS site, so we’ll need to add two accounts to our created
“ExtranetDirectory” database in SQL Management Studio.
In this new environment, I am also running SQL
Server 2012. The process for adding users differs slightly from 2008, so let’s
take a closer look. After launching Management Studio, expand “Databases,” then
“ExranetDirectory,” then “Security,” and right click on “Users” to select “New
User:”
From the next screen, we need to select the “User
Type” drop down and choose “Windows User:”
I will use “AWBIKES\SVC_SPAppPool” for both the
User name and Login name:
Next, we need to click on “Membership” in the
left hand menu and place a check by each item that ends in “_FullAccess.” There
are five in total:
Once that’s complete, we click on “OK.” We can
now see our newly added user listed:
In this particular case, I do not need to add
“AWBIKES\Administrator” because that account is a Database Owner (dbo) for all
databases and already has the necessary permissions. If you are unsure if a
particular account has the appropriate access, simply go ahead and attempt to
add them. If they already exist as a “dbo” you will see an error similar to
this:
Simply click “OK” and move on to the next
step…editing the web.config files. Yippee!!
To successfully deploy FBA, we need to edit at
least two web.config files. Those are the Security Token Service (STS) and the
Content Site. The Central Administration file is optional and is only necessary
if we need to resolve FBA names from within Central Administration. Let’s start
with the STS file.
** IMPORTANT: MAKE A BACKUP OF YOUR EXISTING
WEB.CONFIG FILES FIRST!!!**
Since we are only doing “out of the box” FBA, the
edits to both files will be very minimal. I think the easiest way to navigate
to the correct location of the config files is to open IIS Manager, right click
on the appropriate site and select “Explore:”
Here is what we need to add to the STS file:
<system.web>
<membership>
<providers>
<add connectionStringName="ExtranetDirectory"
applicationName="/" name="Ext"
type="System.Web.Security.SqlMembershipProvider,
System.Web,
 Version=2.0.3600.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a" />
</providers>
</membership>
<roleManager>
<providers>
<add connectionStringName="ExtranetDirectory"
applicationName="/" name="ExtRole"
type="System.Web.Security.SqlRoleProvider, System.Web,

Version=2.0.3600.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a"
/>
</providers>
</roleManager>
</system.web>
<connectionStrings>
<add name="ExtranetDirectory"
connectionString="Data Source=SharePoint1;Initial
Catalog=ExtranetDirectory;Integrated
Security=SSPI" />
</connectionStrings>
See the screenshot below for placement area:
Now let’s make the appropriate edits to the
Content Site web.config. Using the method described above, we can navigate to
the Content Site folder and find the file. Here are the necessary edits based
on our configuration:
<add connectionStringName="ExtranetDirectory"
applicationName="/" name="Ext"
type="System.Web.Security.SqlMembershipProvider,
System.Web,
 Version=2.0.3600.0, Culture=neutral,
PublicKeyToken=b03f5f7f11d50a3a" />
<add connectionStringName="ExtranetDirectory"
applicationName="/" name="ExtRole"
type="System.Web.Security.SqlRoleProvider, System.Web,

Version=2.0.3600.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a"
/>
<connectionStrings>
<add name="ExtranetDirectory"
connectionString="Data Source=SharePoint1;Initial
Catalog=ExtranetDirectory;Integrated
Security=SSPI" />
</connectionStrings>
Additionally, if we want to be able to resolve
partial username matches in the People Picker we also need to add the following
line in the <PeoplePickerWildcards> section:
<add key="Ext" value="%" />
See the screenshots below for placement areas:
Once all of our edits are made, we save the
files. Optionally,we could perform an IIS reset at this point to ensure that
our site has loaded the most recent versions.
We are now ready to begin adding some FBA users
to our database. This is where things get tricky when using SharePoint’s “out
of the box” FBA. There simply is no easy way to add or manage users…and there
is NO WAY to allow users to register themselves or perform any type of
self-service (reset passwords). Of course, this is what ExCM has addressed so
well for hundreds of companies around the world in SharePoint 2007, 2010 and 2013. It allows us to create users manually through the UI, by
invitation, and by anonymous (self) registration. ExCM also provides users with
many self-service features while also providing additional security elements
for our site. Of course, this blog post is primarily about “out of the box” FBA, so let’s look at
our options for adding users to the SQL database we created.
The first option is to add users directly from
within the SQL Management Studio. Basically, we would perform the same steps as
previously mentioned when we added our App Pool Identity as a user to the
database. However, this can be very tedious and time consuming if we want to
create several users at once. There are many screens to click through and we
would have to repeat the same process for each new user.
For this example, I am going to use our
Import\Export utility that was covered in a previous
blog post to add several new FBA users from the ACME
Corporation at once. No need to cover the steps again here, but here is what my
import data looked like before exporting it as a CSV file:
Now we’re ready to test FBA authentication on our
site. I will just my ACME username from the screen shot above. After we
navigate to the site, we need to select “Forms Authentication:”
Then we enter our credentials and click “Sign In:
As you can see, we basically receive an “access
denied” error because my FBA account does not yet have any permission on the
site. Microsoft has, however, made the error a little “nicer” in 2013. This is another example of both the differences
between SharePoint 2010 and 2013 and the cumbersome management of users with
“out of the box” FBA. (With ExCM, we could have
created our user and assigned permissions all at once.) In this instance, we
must login to the site and “share” it with our new FBA users:
Notice above that since I added the “Ext” People
Picker entry in the web.config file I was able to just type “matt” and then
find my FBA user. Also notice that current permissions are set to “Edit” which
is Members Group. You can change this by selecting “Show Options:”
I will just accept the “Edit” permissions and add
my ACME account. After doing so, I receive the following alert in the upper
right hand corner of the screen:
Now if I sign out of the site with the System
Account and try my FBA user again, I see this:
So there you have
it…”out of the box” FBA configured and working in SharePoint 2013.
One more point -
We've got some great SharePoint extranet demonstration videos on our main website that show the business user and administrator experience if you were to include Extranet Collaboration Manager into the mix along with "out-of-the-box" FBA.
One more point -
We've got some great SharePoint extranet demonstration videos on our main website that show the business user and administrator experience if you were to include Extranet Collaboration Manager into the mix along with "out-of-the-box" FBA.
You may also be interested in: