Last modified by Aurelie Bertrand on 2026/01/12 15:14

Show last authors
1 {{ddtoc/}}
2
3 ----
4
5 **Setting up NTLM access to Microsoft SQL Server via JTDS-SSO**
6
7 This document describes how to access Microsoft SQL Server data sources in Windows authentication mode (with or without Single-Sign-On) from DigDash Enterprise.
8
9 = Supported versions =
10
11 * MS SQL Server 6.5
12 * MS SQL Server 7
13 * MS SQL Server 2000
14 * MS SQL Server 2005
15 * MS SQL Server 2008
16
17 = Without the JTDS-SSO add-on =
18
19 DigDash Enterprise natively supports access to Microsoft SQL Server without this add-on.
20
21 You can also access an MS SQL Server database in Windows authentication mode without this add-on by providing the domain, user login and password on the domain.
22
23 The following conditions must be met:
24
25 * In DigDash Enterprise Administrator the URL will look like this: jdbc:jtds:sqlserver:~/~/[HOST]/[DATABASE];domain=[DOMAIN]
26 * And the "User" and "Password" fields will be filled in (no need for the domain in the user name).
27
28 = With the JTDS-SSO add-on =
29
30 The JTDS-SSO add-on is only useful when you want to use Windows built-in authentication without specifying a user or password.
31
32 The following conditions must be met:
33
34 * The DigDash Enterprise server is installed on a Windows computer currently connected to an NT domain.
35 * The user account used to launch tomcat (or the service account) must have access to the database, or a different account and password must be specified when configuring a data source.
36
37 = Setting up the JTDS-SSO add-on =
38
39 In order to allow DigDash Enterprise to access an MS SQL Server database in Integrated Windows authentication mode you need to do the following:
40
41 1. Extract the folder <DigDash Enterprise installation directory>/add-ons/jtds-ss/jtds-sso**.zip** to a directory of your choice on the hard disk. This archive contains one **ntlmauth.d** ll per processor architecture folder.
42 1. Modify the System **Path** environment variable by adding the path to the folder containing the **ntlmauth.dll** __corresponding to your processor architecture__.
43
44 //__Note on using the jTDS + SSO connector with Kerberos__// In the Active Directory, the HTTP/<computername>.<domainename> url service must be mapped (declared "SPN") to the :
45
46 (% class="box" %)
47 (((
48 Setspn.exe -S HTTP/<computer-name>.<domain-name>:<port> <domain-user-account>
49 )))