a·gen·tic a·gil·i·ty

SharePoint 2013 Issue - After migration from 2010 user permission not working

After migrating from SharePoint 2010 to 2013, users may face permission and authentication issues due to changes in claims-based authentication settings.

Published on
2 minute read
Image
https://nkdagility.com/resources/M-S-kXIX-ar
Subscribe

Users coming from a SharePoint 2010 system that try to access SharePoint 2013 after a migration receive a “this site has not been shared with you” message. This mean that they are not able to authenticate to SharePoint 2013.

Further you see authentication issues with user profiles not matching recent changes to Active Directory.

Applies to

Findings

Man this was a hard one. I was searching for ages and pulling my hair out when Tushar Malu found some awesome information that saved my bacon.

In SharePoint 2013 there is a new authentication mechanism called Claim based authentication. Be default through the UI all Applications are created in this mode. There is a way to create web applications that use classic mode authentication in SharePoint 2013 but if you have already created your application tier and you import a Collection from a SharePoint 2010 server then you might find that no one can access your server at all.

After you have imported your SharePoint 2010 data into SharePoint 2013 with the “Mount-SPContentDatabase” command you then need to update all of the user accounts as per:

This while fairly simple is a little difficult to fins and figure out and I spent many hours trying to configure SharePoint User Profile Synchronisation to no avail. In fact all you need is a simple PowerShell to do the synchronisation.

Solution

Although finding this was not simple the execution is. I created a PowerShell script that loops through all of your SharePoint 2013 web applications and upgrades each one to claim’s based authentication.

 1 Param(
 2    [string]  $account = $(Read-Host -prompt "UserAccount")
 3    )
 4Add-PSSnapIn Microsoft.SharePoint.PowerShell
 5
 6foreach ($wa in get-SPWebApplication)
 7{
 8    Write-Host "$($wa.Name) | $($wa.UseClaimsAuthentication )"
 9    #http://technet.microsoft.com/en-us/library/gg251985.aspx
10    $wa.UseClaimsAuthentication = $true
11    $wa.Update()
12    $account = (New-SPClaimsPrincipal -identity $account -identitytype 1).ToEncodedString()
13    $zp = $wa.ZonePolicies("Default")
14    $p = $zp.Add($account,"PSPolicy")
15    $fc=$wa.PolicyRoles.GetSpecialRole("FullControl")
16    $p.PolicyRoleBindings.Add($fc)
17    $wa.Update()
18    $wa.MigrateUsers($true)
19    $wa.ProvisionGlobally()
20}

These commands tool less than 10 minutes to run on 3 content databases with nearly 100GB of data. In addition some bright spark had added “NT AuthorityAuthenticated Users” to one of the main sites ‘”Contributors” group. While this sounds like something that I would do, if I had done it I would have added them to “Readers”…

Troubleshooting Install and Configuration System Configuration
Subscribe

Related blog

No related videos found.

Connect with Martin Hinshelwood

If you've made it this far, it's worth connecting with our principal consultant and coach, Martin Hinshelwood, for a 30-minute 'ask me anything' call.

Our Happy Clients​

We partner with businesses across diverse industries, including finance, insurance, healthcare, pharmaceuticals, technology, engineering, transportation, hospitality, entertainment, legal, government, and military sectors.​

Capita Secure Information Solutions Ltd Logo

Capita Secure Information Solutions Ltd

Illumina Logo

Illumina

Sage Logo

Sage

Brandes Investment Partners L.P. Logo

Brandes Investment Partners L.P.

Genus Breeding Ltd Logo

Genus Breeding Ltd

Jack Links Logo

Jack Links

Hubtel Ghana Logo

Hubtel Ghana

Bistech Logo

Bistech

Deliotte Logo

Deliotte

Slicedbread Logo

Slicedbread

NIT A/S

MacDonald Humfrey (Automation) Ltd. Logo

MacDonald Humfrey (Automation) Ltd.

Teleplan Logo

Teleplan

Cognizant Microsoft Business Group (MBG) Logo

Cognizant Microsoft Business Group (MBG)

Lockheed Martin Logo

Lockheed Martin

DFDS Logo

DFDS

New Signature Logo

New Signature

Emerson Process Management Logo

Emerson Process Management

New Hampshire Supreme Court Logo

New Hampshire Supreme Court

Washington Department of Enterprise Services Logo

Washington Department of Enterprise Services

Royal Air Force Logo

Royal Air Force

Ghana Police Service Logo

Ghana Police Service

Nottingham County Council Logo

Nottingham County Council

Washington Department of Transport Logo

Washington Department of Transport

Teleplan Logo

Teleplan

Illumina Logo

Illumina

Emerson Process Management Logo

Emerson Process Management

YearUp.org Logo

YearUp.org

Capita Secure Information Solutions Ltd Logo

Capita Secure Information Solutions Ltd

Akaditi Logo

Akaditi