Solved

NT Authentication with VB.NET

Posted on 2004-08-10
3
563 Views
Last Modified: 2012-06-21
I am looking for the code to authenticate an NT username/password via VB.NET.  I have located several solutions in VB6 (http://vbnet.mvps.org/index.html?code/network/acceptsecuritycontext.htm), but my attempts to convert them to .NET have been unsuccessful.
0
Comment
Question by:chilltemp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 96

Accepted Solution

by:
Bob Learned earned 500 total points
ID: 11767107
0
 
LVL 4

Expert Comment

by:srcalc
ID: 11767110
0
 

Author Comment

by:chilltemp
ID: 11768657
TheLearnedOne,
Thanks. I was able to get it working with the info on the other page.
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're writing a .NET application to connect to an Access .mdb database and use pre-existing queries that require parameters, you've come to the right place! Let's say the pre-existing query(qryCust) in Access takes a Date as a parameter and l…
Creating an analog clock UserControl seems fairly straight forward.  It is, after all, essentially just a circle with several lines in it!  Two common approaches for rendering an analog clock typically involve either manually calculating points with…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question