MobileAsset v6: Make sure you have patched your system to version 6.3 or newer. The current patch can be downloaded from: https://dl.waspbarcode.com/wasp/MobileAsset_Patch_6x.exe
MobileAsset v7 installs the latest revision of MobileAsset Web.
Make sure that MobileAsset Web is already set up properly in IIS and working in the non-Windows Authentication mode, before attempting to enable Active Directory integration.
To enable the Active Directory integration for the web site, follow these steps:
1. Make a change in C:\Program Files (x86)\Wasp Technologies\MobileAsset\Web\Web.Config file:
Find these original lines:
WARNING: Under IIS, need to enable the following section for Windows Authentication (production) mode --> <!-- <security mode="TransportCredentialOnly"> <transport clientCredentialType="Windows" /> </security> -->
change to the following (you are simply uncommenting a section by removing <!-- from the start of the <security mode line, and --> after </security>):
WARNING: Under IIS, need to enable the following section for Windows Authentication (production) mode --> <security mode="TransportCredentialOnly"> <transport clientCredentialType="Windows" /> </security>
2. In IIS Manager, find the MobileAssetWeb site. In the Authentication settings, make sure Windows Authentication is enabled and Anonymous Authentication is disabled.
If you do not see Windows Authentication in the IIS site settings, you will need to install the ‘Windows Authentication’ Role Service via Server Manager. (location in Server 2016: Server Manager, Add Roles and Features, Server Roles, Web Server (IIS), Web Server, Security, Windows Authentication)
After installing that role, if Windows Authentication still does not show in the website's Authentication settings as an option, you will need to restart the World Wide Web Publishing Service (or possibly the entire server) for that change to take effect. You may need to quit and relaunch the IIS Manager to see the change.
3. Create a new group(s) in Active Directory (or choose an existing Active Directory group(s)), and add the users who will log into MobileAsset Web.
4. In the MobileAsset PC client, Administration, Security, Group Manager, create new group(s) with exactly the same name shown in Active Directory and set up privileges. There is NO NEED for you to create individual users. They will be automatically created as users start to log in under Windows Authentication mode. (See also pages 7-9 of the MobileAsset_Web_Manual.pdf.)
Now when a Windows user in the designated Active Directory group browses MobileAsset Web, they will be logged in automatically.