Skip to main content

Hi,

 

We are trying to impersonate a user accessing via a K2 SmartForm all the way trough to a 3rd party SQL Server.

We are using windows authentication (not kerberos) and the SQL service instance is configured as seen in this screenshot in order to enable the K2 pass-through functionality and impersonation.

 

Running versions:

 

  • .NET Framework v4.0.30319
  • K2 Host Server Version: 4.16200.17215.5
  • SQL Server 2016 (SQL Server 13.0.4446)

11932iC4643986F073A723.jpg

 

The K2 service account is sysadmin on the 3rd party SQL Server 2016

 

10718iCE2FDC340C36BC4F.jpg

 

When we try to run the smartform in a web browser we get a kill state error message:

 

13759iA301DC78096D04C1.jpg

 

Running a sql server profile trace we can see that the underlying sql server error message is as follows:

”The connection has been dropped because the principal that opened it subsequently assumed a new security context, and then tried to reset the connection under its impersonated security context. This scenario is not supported. See "Impersonation Overview" in Books Online.”

 

Below is a screen shot from the trace showing the actual error:

 

15499iD5D3E3D71BD0B35D.jpg

 

Account "m01adm" runs the HostServer instance, "h02" is the user that runs the smartform.

 

Any suggestions and/or tips is appreciated.

Be the first to reply!

Reply