Solved

Password change in non-trusted domains

Posted on 1997-06-11
2
551 Views
Last Modified: 2013-12-23
I have two seperate (not trusted) domains.  A couple of users from one domain require access to resources in the other domain.  For political and security reasons the domain structure is not to be altered.  I have created accounts on the second domain for the users and set the account so they "must change passwork on first login".  When they go to connect to the second domain, a dialog box tells them they must change their password, but does not provide any way to do this.

The second domain can be seen in Network Neighbourhood.  If they try <CTRL. <ALT> <DEL> then "change password" then enter their username, domain name and passwords, a dialog appears saying it cannot find the domain required.

If I set the users password not to expire on the second domain, they can logon OK - but this is not desireable.

Any clues ????
0
Comment
Question by:coljam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 2

Accepted Solution

by:
armands earned 200 total points
ID: 1560738
I spent couple of hours to play with password changing in untrusted domain environment and don't find any reason why it shouldn't work. Of course, unless the both domains are on the same subnet, you have to specify remote domain's PDC in your LMHOSTS file. The entry should be is such format:

<IP address of remote PDC> <name of remote PDC> #PRE #DOM:<remote domain name>

After that reboot your computer or type from command prompt
   nbtstat -R
and change the password (<CTRL> <ALT> <DEL> and so on).

If it won't help I'll need then closer look on your system, but I hope that all will be OK.
0
 

Author Comment

by:coljam
ID: 1560739
Concise and accurate answer - well done
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question