Solved

Domain Application Question

Posted on 2004-10-11
2
206 Views
Last Modified: 2010-04-19
Hello!

Ok, im really new to this, so i need some help just being pointed in the right direction so that I can research it.

I've seen networks that give out permission to certian applictions based on domian log in.

For example, user A logs in and has access to the entire office suite, and certian programs. When user b logs in to the domain, they do not get the other programs.
I know this can be done locally, but i'm talking a network of 5000 computers. At any computer, the user A has access to those programs (and their personal files). How does this happen? I know that all these programs are not installed on each computer, so its as if the server is installing them per sesson.... I'm just confused... is this Terminal Services? or something else?

What is this called and where do i find info on it?

Thanks!

Bick
0
Comment
Question by:bick2000
  • 2
2 Comments
 
LVL 15

Accepted Solution

by:
scampgb earned 500 total points
ID: 12278930
Hi bick2000,

I just responded to your other question : http://www.experts-exchange.com/Networking/Q_21163898.html#0 "Network Application Question".  I suggest you ask the Mods to delete one or the other.

Anyway, this is what I posted:


You're *sure* the applications aren't installed locally and you just can't see them?

There are two things that could be happening here - one is terminal services and the other is that the applications are actually being installed on the fly.

I'd bet that it's Terminal Services.  It would be a logical solution in the environment you describe.

As for how it's done, there (once again!) are a few options.
It could be done with group policies in the OUs.  These can be configured to show restricted desktops and only allow you to see the icons for the applications you're supposed to access.
The other way is to use a security group to restrict who can access the application executable files.

Basically, there's a few ways you can go about doing the above - which is the most appropriate depends on your environment.

Does that help?

If you'd like more info, can you please explain a little more about what you're trying to achieve?
0
 
LVL 15

Expert Comment

by:scampgb
ID: 12638712
Glad I could help :-)
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Organizations create, modify, and maintain huge amounts of data to help their businesses earn money and generally function.  Typically every network user within an organization has a bit of disk space to store in process items and personal files.   …
Numerous times I have been asked this questions that what is it that makes my machine log on so slow, there have been cases where computers took 23 minute exactly after taking password and getting to the desktop. Interesting thing was the fact th…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now