Hello I am hosting remoting within IIS. Everything works just fine as long as I allow anonymous access at the IIS level. When I allow only Windows Authenticated sessions, something very strange happens: If the client activates the remote object with IP address - works fine If the client activates it using a machine name - get http 401 exception is thrown. The exception is thrown when the client calls the remote method. I set the channel's useDefaultCredentials property to true. Any idea how to allow Windows Authentication? Here is the call stack: System.Net.WebException: The remote server returned an error: (401) Unauthorized .. ---> System.ComponentModel.Win32Exception: The target principal name is incorrect at System.Net.NTAuthentication.GetOutgoingBlob(Byte incomingBlob, Boolean handshakeComplete) at System.Net.NTAuthentication.GetOutgoingBlob(String incomingBlob, Boolean handshakeComplete) at System.Net.NegotiateClient.DoAuthenticate(String challenge, WebRequest webRequest, ICredentials credentials, Boolean preAuthenticate) at System.Net.NegotiateClient.DoAuthenticate(String challenge, WebRequest webRequest, ICredentials credentials, Boolean preAuthenticate) at System.Net.NegotiateClient.Authenticate(String challenge, WebRequest webRequest, ICredentials credentials) at System.Net.AuthenticationManager.Authenticate(String challenge, WebRequest request, ICredentials credentials) at System.Net.AuthenticationState.AttemptAuthenticate (HttpWebRequest httpWebRequest, ICredentials authInfo) --- End of inner exception stack trace ---3511
program for string reverse(eg:- i am boy -> boy am i)8 10030
Write a program. there are 1..n numbers placed in an array in random fashion with one integer missing. find the missing number.1 4368
HOW CAN YOU IMPROVE THIS FIRM?
Explain your process for tracing and fixing a memory leak
What is the target set plan for distibutor...?
What's the difference between a finite state machine (FSM) and a hierarchical finite state machine (HFSM)? Give an example of a hierarchical state machine with functionality that you could not easily replicate in a non-hierarchical FSM.
what are the types of Bug?
Have you used Pull list or back flushing in REM?
Is it normal in your company, that you do not pay penalty, if that is agreed in contract?
Discuss the economics of automation and the role of metrics in testing.
dear sir please provide what question will be asked in bank it officer interview
suppose u have been seven tables based on that u have to create a report u don't have access to db. then how do u find the relation between tables
HOW TO REDUCE POWER PLANT AUXILIARY POWER CONSUMPTION?
how many remote desktop tools are there in windows server 2k3 & 2k8? please help me
How does u handle this COM components developed in other programming languages in .NET?
Why is Ubuntu the most popular operating system for cloud?
I have a requirement from the SD people wherein whenver one runs the tcode F-02 (Enter G/L account Policy : Header Data), they should not get the list of all acounts in the ACCOUNT field. But when i go to pfcg to check for restricting the list, i dont find any pertinet auth field for doing so. Isi t something that we can ( as Basis Admin) do or the ABAPpers to do. Maybe the ABAPpers have to program the screen where in they need to restrict the list options. If not so, lemme know the auth field that has to bet set if any.