TFS 2012 - Issue: TF30063: You are not authorized to access and can’t trace permissions
Explains how a global "deny" permission in TFS 2012 can block SharePoint 2010 access, causing TF30063 errors, and highlights where to check for …
TL;DR; After migrating from SharePoint 2010 to 2013, users may face permission and authentication issues due to changes in claims-based authentication settings.
Users coming from a SharePoint 2010 system that try to access SharePoint 2013 after a migration receive a “this site has not been shared with you” message. This mean that they are not able to authenticate to SharePoint 2013.
Further you see authentication issues with user profiles not matching recent changes to Active Directory.
Man this was a hard one. I was searching for ages and pulling my hair out when Tushar Malu found some awesome information that saved my bacon.
In SharePoint 2013 there is a new authentication mechanism called Claim based authentication. Be default through the UI all Applications are created in this mode. There is a way to create web applications that use classic mode authentication in SharePoint 2013 but if you have already created your application tier and you import a Collection from a SharePoint 2010 server then you might find that no one can access your server at all.
After you have imported your SharePoint 2010 data into SharePoint 2013 with the “Mount-SPContentDatabase” command you then need to update all of the user accounts as per:
This while fairly simple is a little difficult to fins and figure out and I spent many hours trying to configure SharePoint User Profile Synchronisation to no avail. In fact all you need is a simple PowerShell to do the synchronisation.
Although finding this was not simple the execution is. I created a PowerShell script that loops through all of your SharePoint 2013 web applications and upgrades each one to claim’s based authentication.
1 Param(
2 [string] $account = $(Read-Host -prompt "UserAccount")
3 )
4Add-PSSnapIn Microsoft.SharePoint.PowerShell
5
6foreach ($wa in get-SPWebApplication)
7{
8 Write-Host "$($wa.Name) | $($wa.UseClaimsAuthentication )"
9 #http://technet.microsoft.com/en-us/library/gg251985.aspx
10 $wa.UseClaimsAuthentication = $true
11 $wa.Update()
12 $account = (New-SPClaimsPrincipal -identity $account -identitytype 1).ToEncodedString()
13 $zp = $wa.ZonePolicies("Default")
14 $p = $zp.Add($account,"PSPolicy")
15 $fc=$wa.PolicyRoles.GetSpecialRole("FullControl")
16 $p.PolicyRoleBindings.Add($fc)
17 $wa.Update()
18 $wa.MigrateUsers($true)
19 $wa.ProvisionGlobally()
20}
These commands tool less than 10 minutes to run on 3 content databases with nearly 100GB of data. In addition some bright spark had added “NT AuthorityAuthenticated Users” to one of the main sites ‘”Contributors” group. While this sounds like something that I would do, if I had done it I would have added them to “Readers”…
Each classification [Concepts, Categories, & Tags] was assigned using AI-powered semantic analysis and scored across relevance, depth, and alignment. Final decisions? Still human. Always traceable. Hover to see how it applies.
If you've made it this far, it's worth connecting with our principal consultant and coach, Martin Hinshelwood, for a 30-minute 'ask me anything' call.
We partner with businesses across diverse industries, including finance, insurance, healthcare, pharmaceuticals, technology, engineering, transportation, hospitality, entertainment, legal, government, and military sectors.
Schlumberger
Trayport
ALS Life Sciences
Healthgrades
Emerson Process Management
Big Data for Humans
Philips
Lockheed Martin
Xceptor - Process and Data Automation
Workday
NIT A/S
Genus Breeding Ltd
CR2
MacDonald Humfrey (Automation) Ltd.
Teleplan
Capita Secure Information Solutions Ltd
Akaditi
Freadom
Department of Work and Pensions (UK)
Ghana Police Service
New Hampshire Supreme Court
Royal Air Force
Washington Department of Enterprise Services
Nottingham County Council
SuperControl
Emerson Process Management
Cognizant Microsoft Business Group (MBG)
Freadom
Sage
Boeing