Archive: ‘Windows’ Category

The ‘Microsoft.Jet.OLEDB.4.0’ provider is not registered on the local machine.

14 comments April 1st, 2013

This error occurs when a 32bit application attempts to access a 64 bit .NET library which is not authorized by default in Windows 2008 R2 since it is a 64bit OS.

Run the following commands from an administrator command prompt to enable the .NET 32 bit libraries to be accessible via your IIS 7.5 web server :

  1. cscript %SYSTEMDRIVE%\inetpub\adminscripts\adsutil.vbs SET W3SVC/AppPools/Enable32bitAppOnWin64 1
  2. %SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\aspnet_regiis.exe -i 3.
  3. iisreset

Your 32bit application should now work on your 64bit server.

500 Internal Server Error while using Client Certificate Mapping in IIS 7.

2 comments February 26th, 2011

I have a client (he reads my blog from time to time, so Hello if you’re reading this. ;o) who experienced an issue I hadn’t run across before.  They are migrating their MOSS 2007 environment to another location and were basically trying to setup the same version of MOSS but virtualized on Windows 2008/IIS 7 rather than physically on Windows 2003/IIS 6.

They have several Smart Card/CAC authenticated extended sites for external users.  They were using the IIS Certificate Mapping feature which is a bit different and causes some of extra work since their isn’t actually a GUI in IIS 7 like there was in IIS 6. 

We got everything configured properly using the following article if you’re interested in implementing this in your environment:

Configuring Many-to-One Client Certificate Mappings for IIS 7/7.5

Even though we had all this configured properly, the MOSS sites would not resolve, they rendered a non-specific 500 Internal Server Error instead, fun stuff right?

After hours of troubleshooting the configuration and finally bringing on an IIS expert from Microsoft’s support team, they found out that this issue was being caused by the two registry keys below. These were added as part of a security update that was designed as a workaround to a TLS/SSL vulnerability.

  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\
  • DisableRenegoOnClient=1
  • DisableRenegoOnServer=1 

These registry keys are mentioned in KB 977377. We resolved the issue by setting both of these to 0 (zero) and rebooting the server. 

So essentially remnant registry settings from the following security patch caused this issue:

Microsoft Security Advisory: Vulnerability in TLS/SSL could allow spoofing KB977377

The TLS/SSL vulnerability was actually fixed rather than worked around in:  

MS10-049: Vulnerabilities in SChannel could allow remove code execution

and replaced the above KB 977377.

Hopefully the above resolution will help someone else…

Enjoy, and let me know if you come across this same issue in your environment.

Windows Registry Scripts

No comments January 3rd, 2011

Often we find ourselves looking up the same registry paths and mods over and over again every time we deploy a SharePoint Farm. If we’re lucky we’ll remember to export the registry key after we modify them for use down the road, but of course it either never leaves the server or sits on a media we no longer use. So for my benefit and yours, I figured I’d add the scripts here:

Just copy and paste them into a .reg file and double click, or you can download it (Click the name of the file) from here:

Disable Loopback:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa]
"DisableLoopbackCheck"=dword:00000001

Disable FIPS:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy]
"Enabled"=dword:00000000

Disable UAC:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"EnableLUA"=dword:00000000