Login Prompt from the Web Client asks you for a password / can't log in
If the Nodinite Web Client prompts you for a password or prevents login, this guide helps you quickly identify and resolve the most common causes. Ensure seamless access by following these troubleshooting steps:
✅ Ensure Windows Authentication is enabled in IIS
✅ Verify user or AD group is registered in Nodinite
✅ Add HTTPS sites to browser Trusted Sites or Local Intranet zone
✅ Check firewall and local policy settings for domain communication
✅ Configure IIS authentication providers correctly
Nodinite relies on Windows Authentication and uses integrated security. IIS and Windows must be properly configured, and firewall settings must allow communication with domain controllers.
Note
Web Client URL varies by version and configuration:
- Nodinite v7:
http://localhost:40000(default) orhttps://localhostorhttps://servername(with TLS on port 443)- Nodinite v6:
http://servername/WebClientorhttps://servername/WebClient(with TLS)See Install Nodinite v7 or Upgrading from v6 to v7 for version-specific configuration details.
The proper setup for IIS and Windows is described in the Install Nodinite guide.
Common Troubleshooting Checklist
| Issue / Check | Resolution | |
|---|---|---|
| Is the Windows Identity added as a user or part of a registered AD Group? | User must exist in Nodinite Users not registered or part of an AD group cannot log in | |
| Test locally on the Nodinite server | If login works locally, the issue is network-related (firewall, browser configuration, domain connectivity) | |
| Verify Windows Authentication role is installed in IIS - See IIS Windows Features | Most common problem - Windows Authentication must be installed in IIS![]() Example: Windows Authentication role installed in IIS. |
|
| Check IIS Authentication providers - See IIS Authentication settings | Ensure Negotiate and NTLM providers are enabled (Kerberos preferred) | |
| Verify 'Access this computer from the network' local policy | Windows default includes Everyone - restrictive policies may block domain users![]() Example: Windows default policy with Everyone in the list. |
|
| Modern browser Windows Authentication - See Browser Configuration below | Chrome, Edge, Firefox require configuration to pass Windows credentials automatically |
HTTPS/TLS Local Browsing - Trusted Sites Requirement
When accessing Nodinite Web Client over HTTPS on localhost or local network, Windows and browsers require the site to be in the Trusted Sites or Local Intranet zone to automatically pass credentials.
Symptom
- Browsing to
https://localhost/WebClientorhttps://servername/WebClientprompts for password - Same URL with
http://works without prompt (but HTTPS fails) - Certificate warnings may appear before login prompt
Solution: Add to Trusted Sites (Windows)
- Open Internet Options (Windows Settings or
inetcpl.cpl) - Go to Security tab → Trusted sites
- Click Sites button
- Uncheck "Require server verification (https:) for all sites in this zone" (if using self-signed certificates)
- Add your Nodinite URL:
https://localhosthttps://servername.domain.comhttps://nodinite.yourdomain.com
- Click Add, then Close
- Click OK to save
Tip
For production environments with valid SSL certificates, keep "Require server verification" checked and ensure your certificate is trusted by Windows. See How to perform hardening for HTTPS configuration guidance.
Modern Browser Configuration
Different browsers handle Windows Authentication differently:
Microsoft Edge (Chromium)
- Inherits Windows Internet Options - Adding to Trusted Sites (above) automatically enables SSO
- Alternatively, configure via
edge://settings/privacy:- Enable "Automatically sign in to sites using Windows credentials"
Google Chrome
- Windows: Inherits Internet Options Trusted Sites (same as Edge)
- Manual configuration: Add to allowed authentication servers:
- Navigate to
chrome://policy - Set
AuthServerAllowlistpolicy tohttps://servername.domain.comor*.yourdomain.com - Or use Group Policy: Computer Configuration → Administrative Templates → Google Chrome → Authentication server allowlist
- Navigate to
Mozilla Firefox
- Does not use Windows Internet Options - requires manual configuration:
- Navigate to
about:config - Search for
network.automatic-ntlm-auth.trusted-uris - Add value:
https://servername.domain.comor.yourdomain.com(comma-separated) - Search for
network.negotiate-auth.trusted-urisand add the same value
- Navigate to
Note
For detailed browser SSO configuration, see Microsoft's Browser configuration for Windows Authentication guidance.
Network and Firewall Issues
If login works locally but fails remotely:
- Firewall blocking Kerberos/NTLM: Ensure TCP/UDP ports for domain authentication are open (Kerberos: 88, LDAP: 389, 636)
- DNS resolution: Client must resolve server hostname to access via FQDN (not IP address)
- Time synchronization: Kerberos requires client and server clocks within 5 minutes - see PACVerification
- Domain connectivity: Client must reach domain controllers for authentication
See Troubleshooting Windows Authentication for advanced diagnostics.
Next Steps
- Add or manage User
- Add or manage Role
- Add or manage Windows AD Group
- Configure HTTPS - Secure your installation with TLS
Related Topics
Access Management
Windows Authentication Mode:
OAuth 2.0/OpenID Connect Mode:
- Claims - Authorization key/value pairs for OIDC/OAuth 2.0
- Policies - Groups of Claims that define permission sets
- Roles - Assign Policies to control access
IIS and Windows Configuration
- IIS Authentication settings - Configure authentication providers
- IIS Windows Features - Required IIS components
- How to perform hardening - HTTPS/TLS configuration
- PACVerification - Troubleshoot Kerberos time sync issues
Installation and Setup
- Install Nodinite - Complete installation guide
- Web Client Overview - Feature documentation

