Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

A COM+ Client That Uses a Proxy May Receive a "Permission Denied" Error Message (800A0046) When CLB Is Used on a Computer That Is Running Microsoft Windows Server 2003


View products that this article applies to.

Symptoms

Your client application may try to create an object that uses Component Load Balancing (CLB) on a computer that is running Windows Server 2003. If that object has a proxy with a remote server name that points to the Application Center 2000 routing cluster virtual IP (VIP) that is installed on the client computer, you may receive the following error message:

Permission Denied

↑ Back to the top


Cause

By default, COM+ application access checks are turned on in Windows Server 2003. This is done to help increase the security and may help to prevent anonymous users from creating objects on the Windows Server 2003 COM+ application servers. CLB uses the anonymous account to create objects for client computers that use proxies to point to the routing cluster.

↑ Back to the top


Resolution

You can resolve this issue by using one of the following methods:
  • Method 1

    You can create a role to permit access and to add the NT AUTHORITY\ANONYMOUS LOGON account or the NT AUTHORITY\NETWORK group to the role. For each component that is load balanced, click to select the role on the Security tab. This permits you to set the access on a per component basis
  • Method 2

    You can restore the Microsoft Windows 2000 setting if you click to clear the Enforce access checks for this application check box on the property sheet of the component in the Component Services snap-in. You must do this for all load balanced applications that must be accessed by clients that use proxies to point to the CLB routing cluster. This permits access to all components in the application.

↑ Back to the top


Status

This behavior is by design.

↑ Back to the top


More information

You can enforce security roles on COM+ method calls. You can do this to help prevent users from using the objects that they create if their account does not have an appropriate role.

↑ Back to the top


References

For additional information about creating roles in COM+, click the following article number to view the article in the Microsoft Knowledge Base:
326818� PRB: MTS and COM+ Roles Are Not Applied Immediately

↑ Back to the top


Keywords: KB820440, kbprb

↑ Back to the top

Article Info
Article ID : 820440
Revision : 4
Created on : 5/30/2003
Published on : 5/30/2003
Exists online : False
Views : 384