Solved

authentacate to win2k server over vpn

Posted on 2004-08-05
3
243 Views
Last Modified: 2010-04-11
Hello all

            I hope this is a network question and not a os/sql one but here we go. I am usieng remote access over a von client. I can map and use outlook over the web into my home as if i was at work.
            We have an aplication that uses sql to connect it(sorry if i worded that wrong i know nothing of swl). now how it seems to work is sql checks if you are a valid network user then loges you into the database(application).
            the problem is seeing s i am at home i dont log into the network so i dont show up as a valid user and it does not send me a login box like outlook does.
           
 know there has to be a work around some where

0
Comment
Question by:briankeegan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 13

Accepted Solution

by:
hstiles earned 500 total points
ID: 11734549
are you using the same username and ID on your home PC as work?  Try that.
0
 
LVL 1

Author Comment

by:briankeegan
ID: 11735274
ok i will try that tonight thanks
0
 
LVL 1

Author Comment

by:briankeegan
ID: 11735288
oh ya it "sees" that is my machine name \id wont that mess it up as it normally wants to see my win2k domain\id?
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question