Solved

Additional "Administrator" login panel -- how to stop?

Posted on 2001-06-05
2
173 Views
Last Modified: 2010-04-13
I have a local WORKGROUP of about 20 machines, all new Win2K Pro installs.  There's no
Domain and no Active Directory.  Individual Machines in a workgroup and on a Netware 5
network.

Each machine is deployed for a SINGLE workstation user.  User is defined with group
membership in the Administrators group (were Power Users but we found too many of
our individual-user-installed software packages wouldn't install properly without the Administrator).  This is NOT a security problem in this instance.

At the Alt-Ctrl-Delete login response, all users receive (as expected) the Novell Client
login panel.  They enter their username and password (which is already synchronized
with their Win2K username and password) and are successfully logged into the Netware
network.

At this point they're confronted with a (Windows?) login panel offering Administrator as the userid and a blank password panel.  In order to proceed they have to enter their own userid and password (the same strings they just entered an instant before to the Novell login panel).

If I switch a user to the Power Users group, they don't get this superfluous login panel.  But
they also can't install some of their software -- they have to log out, have ME log in, do the
install for them, I log back out, they log back in, etc....  A pain we both can do without.

How can I stop this superfluous login panel?
0
Comment
Question by:jlw011597
2 Comments
 
LVL 7

Accepted Solution

by:
Ajnin earned 100 total points
ID: 6156921
On the Novell login screen click the Advanced button. In there there is a tab called Workstation (are something like that). When you click the tab you should see the workstation user id Administrator listed. If you change to your users Novell login name. It should only pop up once more with their userid instead of Administrator. They should be able to put in the password and check the box to keep passwords the same. That should do it for you.
Let us know.
0
 

Author Comment

by:jlw011597
ID: 6157731
That looks to have corrected the issue.  Thanks!
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now