How Do I assign permisssions

Posted on 2003-03-20
Medium Priority
Last Modified: 2010-04-13
I have users who are not logged on under the domain and who still want access to a network drive, how do i stop them being prompted for a user name and password to the network share when they are signed in as LOCAL MACHINE\USER   not   DOMAIN\USER i have not set any permissions on the network share but how do i give these users access without them logging on as DOMAIN\USER?

This is basic and ive been reprimanded for my foolisheness.... any help for the logically challenged??????

Question by:Jkambour
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 12

Expert Comment

ID: 8179319
There's no reason for you to have been reprimanded, because this simply isn't possible. If the user is not logged on to the domain, and then try to access domain-hosted network resources, they WILL have to log on to the domain at that point--no ifs, no buts.
LVL 13

Accepted Solution

rhinoceros earned 525 total points
ID: 8179535
I also have the most likely case as before (for AD server + W2K standalone PC), I hope it can help you

The solution:
Create one same account name with same password in both sides of workstation (local account) & server (domain account). The network share folder is given the permission for that domain user account.

(For Physical map driver) At the first time you still need to map the drive for that folder to entry username & password into pop's up dialog, then the computer will auto record it to let you directly map drive with no authorization in next time after restart.

(P.S. different name & different password will not work)

LVL 13

Expert Comment

ID: 8180346
Enable the guest account on the server that hosts the network drive.

Expert Comment

ID: 8181812
the BETTER solution would be to make these machines members of the domain:  this would allow you to administer them more thoroughly, and, if done correctly, should not prevent them from doing anything.

-Steven Yarnot

Featured Post

What Is Blockchain Technology?

Blockchain is a technology that underpins the success of Bitcoin and other digital currencies, but it has uses far beyond finance. Learn how blockchain works and why it is proving disruptive to other areas of IT.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
How to fix incompatible JVM issue while installing Eclipse While installing Eclipse in windows, got one error like above and unable to proceed with the installation. This video describes how to successfully install Eclipse. How to solve incompa…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question