Table of Contents
- Overview
- Solution
- Troubleshooting & Investigation
- Supported Remediation / Best Practice
- Verification (Post-fix Checks)
- Frequently Asked Questions
Overview
In Aurea CRM (ACRM) 15.25.2 using Windows/IIS SSO (NTLM/Kerberos)—commonly deployed with Azure Entra ID / Windows Integrated Authentication (WIA)—you may observe that inactive employees can still be automatically signed in, or that users are signed in using an inactive/legacy ACRM login.
This occurs because IIS/Windows completes authentication first, and ACRM then maps the authenticated identity to a Login (US) record using Windows Domain + Windows User Name. If an inactive/legacy Login (US) still contains that mapping, or if multiple Login (US) records share the same mapping, ACRM can still resolve a login and the selection becomes ambiguous. This behavior is addressed through configuration/data hygiene (unique mappings and removal of mappings for inactive users); no product hotfix/version change was identified for this specific behavior.
Solution
Issue (Symptoms)
In ACRM (reported on 15.25.2) using Windows/IIS SSO (NTLM/Kerberos):
- Inactive employees/accounts can still authenticate via SSO.
- If an active and inactive ACRM Login are both mapped to the same Windows identity, ACRM may log the user in as the inactive account.
Environment / Context
- Module: CRM Web (
CRM.Web) - SSO method: IIS Windows Authentication (NTLM/Kerberos), often used alongside Azure Entra ID / Windows Integrated Authentication (WIA)
How to recognize this issue
You are likely affected if either of the following is true:
- An “inactive” ACRM user can still open
CRM.Weband is automatically logged in (SSO still resolves them to a Login). - A single Windows identity (same domain + username) sometimes logs into the “wrong” ACRM Login (commonly an inactive/legacy login).
Root cause (What’s happening)
- IIS/Windows authenticates first (NTLM/Kerberos).
-
ACRM maps the authenticated identity by finding a Login (US) record that contains:
- Windows Domain
- Windows User Name
If the mapping exists on any Login (US), ACRM has enough information to complete SSO mapping for that Windows identity.
If multiple Login (US) records contain the same Windows Domain + Windows User Name, the configuration is ambiguous and ACRM may select an unintended login (effectively “first match wins” behavior). There is no supported “prefer active user” disambiguation for duplicates—duplicates must be removed.
Troubleshooting & Investigation
1) Confirm what Windows identity IIS is presenting
- From a domain-joined workstation/browser, access
CRM.Weband confirm the Windows identity being used for Windows Authentication. - If needed, use an IIS test approach to display the authenticated user so you can confirm the exact
DOMAIN\username(or equivalent) value IIS passes.
Record the values as:
<windows_domain><windows_username>
2) Audit ACRM user mappings for duplicates
In ACRM, search in Login (US) for records where:
- Windows Domain =
<windows_domain> - Windows User Name =
<windows_username>
If more than one Login (US) record matches, SSO mapping is ambiguous and must be cleaned up.
3) Check inactive/legacy logins still holding mappings
For users who should not access ACRM anymore:
- Verify whether their Login (US) record still contains Windows Domain / Windows User Name.
- Verify whether any other Login (US) record (including inactive/legacy) still contains the same mapping.
4) Validate IIS configuration for Windows SSO
In IIS for the CRM.Web site/application:
- Ensure Windows Authentication = Enabled
- Ensure Anonymous Authentication = Disabled
- Confirm the provider configuration matches your supported setup (commonly NTLM as required by your deployment standard)
Misconfiguration can change how identities are presented and complicate mapping cleanup.
Supported Remediation / Best Practice
A) Remove SSO access for inactive users (required)
For each user who must no longer access ACRM via Windows/IIS SSO:
-
Deactivate the ACRM user
- Mark the Rep/user as Inactive using your standard deactivation process.
-
Remove the SSO mapping from Login (US)
- Open the user’s Login (US) record.
- Clear:
- Windows Domain
- Windows User Name
- Save.
Result: Even if the Windows account can still authenticate to IIS, ACRM will no longer be able to resolve that Windows identity to an ACRM Login via SSO.
B) Eliminate duplicate mappings (required)
- Identify every Windows identity (
<windows_domain>+<windows_username>) that appears in more than one Login (US) record. - Decide which single Login (US) should own that mapping (typically the active/current login).
- Remove the mapping (clear Windows Domain / Windows User Name) from:
- inactive logins
- legacy logins
- any duplicate logins
Target state (best practice): Exactly one Login (US) record contains a given Windows Domain + Windows User Name mapping.
C) If using modern CRM.Web SSO (OIDC-style) instead of IIS/NTLM
If your deployment uses the CRM.Web “button-based” SSO (for example, Azure AD / Google OAuth configured via users.xml) rather than IIS Windows Authentication:
- Ensure the selected claim (NameClaimType) maps uniquely to exactly one active ACRM user identity.
- Remove or disable the mapping for inactive users so they cannot be resolved to an ACRM login.
Verification (Post-fix Checks)
-
Previously inactive user
- Attempt SSO login again.
- Expected: the user is not automatically logged into
CRM.Webbecause the mapping no longer exists. Depending on your setup, they may see the standard login page or an authorization failure, but they should not land in an ACRM session.
-
Previously ambiguous/duplicate mapping user
- Attempt SSO login multiple times.
- Expected: the user is consistently logged into the intended (active) ACRM Login.
-
Mapping uniqueness audit
- Re-run the Login (US) search for
<windows_domain>+<windows_username>. - Expected: exactly one record matches for each Windows identity.
- Re-run the Login (US) search for
Frequently Asked Questions
- 1. How do I know if an “inactive” ACRM user still has SSO access?
- If an inactive user can open
CRM.Weband is automatically logged in via Windows SSO, their Windows identity is still resolving to a Login (US). Check the user’s Login (US) record and confirm Windows Domain/Windows User Name are cleared, and also confirm no other Login (US) record still contains the same mapping. - 2. Why does ACRM sometimes log users into the inactive account when both active and inactive logins share the same Windows user?
- With Windows/IIS SSO, ACRM maps based on Windows Domain + Windows User Name maintained in Login (US). If multiple Login (US) records share the same mapping, it becomes ambiguous and ACRM can resolve the wrong login. The supported fix is to ensure each Windows identity is mapped in exactly one Login (US) record.
- 3. Is there a supported setting to make ACRM automatically reject inactive users during Windows/IIS SSO?
- The supported approach is administrative: deactivate the user and remove the SSO mapping (clear Windows Domain and Windows User Name) so the Windows identity cannot resolve to any ACRM Login. Also remove any duplicate mappings so there is no ambiguous resolution.
- 4. What if the user still gets logged in after I cleared the mapping on their Login (US)?
- Check for duplicates: another Login (US) record may still contain the same Windows Domain + Windows User Name. Also confirm the exact Windows identity IIS is presenting (domain/username may differ from what you expect due to browser/IIS settings), then clean up the mapping that matches what IIS actually sends.
- 5. What IIS settings should be checked when troubleshooting Windows SSO mapping issues?
- Validate that Windows Authentication is enabled, Anonymous Authentication is disabled, and the Windows Authentication providers are configured per your supported standard (commonly NTLM for this scenario). Incorrect IIS settings can change the identity presented to ACRM and lead to unexpected mapping behavior.
Priyanka Bhotika
Comments