Troubleshooting authentication rules

In rule-based authentication, problems often present as:

  • Users are not challenged for credentials when a challenge is expected
  • Users are challenged for credentials when no challenge is expected
  • User authentication is performed against the wrong domain

These problems occur in one of the following phases of user authentication processing:

  • General user authentication logic (outlined below)
  • Rule definition and matching
  • User authentication protocol processing (IWA, NTLM, LDAP; for IWA troubleshooting, see Troubleshooting Integrated Windows Authentication.)