Using runas /user:machinename\account localexepath everything runs
perfect. So again it really looks as though the I/O operation at the
Msoft level to find the second share inherits the perms of the executing
user.

 

So next question. Is this the best solution?

 

Thoughts?

 

TIA

JB

 

From: Tom Miller [mailto:[email protected]] 
Sent: Tuesday, May 05, 2009 5:16 PM
To: NT System Admin Issues
Subject: RE: Sorry for the simple question but I'm a developer not a Sys
Admin Guru

 

Are we talking Windows shares, CIFS, etc?  If you are talking Windows,
this would be easiest with Active Directory using a single set of
credentials per user, then pass-through authentication should work.
Single-server accounts will cause you grief - stay away from that
scenario if you can.   Put the server in AD DS if you can, even if it's
only a single server AD, then at least you could create a cross forest
Trust. How is this different? Maintaining hundreds of single server
accounts or maintaining hundreds of ad accounts? The agents, even if
they are "employees" will provide their own laptops and thus each have
their own login. We have no issue giving them the uid & pwd for access
to what they need but apparently somewhere behind the scenes Msoft.
doesn't use the credentials challenged for initially. In the application
we say ok after you have logged in look for this folder in the same
location. It appears that file I/O Operation must inherit the security
context of the logged in user instead of using the uid / pwd challenged
for. 

 

 

Also, version of server (assuming Windows) will matter.  Windows 2008 is
better than 2003 at security and out of the box won't let you do much.
That's the opposite of 2003, for the most part.

 

So, if you can:

1.  Get the server into a domain.  Any reason preventing it?

2.  Use AD accounts and put those who need access in a group.

                Problem here is that these people are NOT employees.
Think of it like insurance. These agents sell our insurance but also
other products / policies.

4.  Optional:  if the VPN is reliable and has decent throughput, you can
put those PCs in the domain.  Even a low-end PC at your remote site can
be a DC for authentication.

 

 

If you're talking Linux, never mind ;-)  If you're not a sys admin, then
those folks could probably give you a hand with this.

J J J In this case those folks are the ones asking me for help.... J J
J....and I've gotten a lot further then they did. Please don't flame
about competent help etc. I can do nothing about it nor talk to anyone
in a position to do anything about it...but you are right that is part
of the problem.

 

Tom Miller
Engineer, Information Technology
Hampton-Newport News Community Services Board
757-788-0528

 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to