Error: code = 1326 (unknown user name or bad password).

Posted on 2005-04-05
Last Modified: 2010-04-13
I have client software application that is installed on about 30 Windows 2000 boxes (30 users).
The Client application connects (via intranet) to a remote host that houses an oracle database.  
Logon to the database is controlled via the users' Windows 2000 username/password.
Under MOST circumstances, users are able to use the client application to access the database.
However, at some SMALL BUT SIGNIFICANT FREQUENCY (~ 5 times per day) SOME users are denied access to the database and the following error shows up in the log files: Id: [2912] Error code = 1326: unknown user name or bad password.
This error is TRANSIENT (i.e. it lasts anywhere from 5 to 30 minutes and then spontaneously resolves itself).  And no, they are not mistyping their usernames/passwords.

The network is not under heavy load, and I feel that by the given error that this is some type of security or networking issue, but I know next to nothing about Win2k.

Any idea as to where I might poke around to fix the issue?

I have contacted software vendor but haven't heard back yet and am looking for suggestions.

Question by:pdanese
    LVL 7

    Accepted Solution

    at the time of the issue can a user log onto a workstation?  Could be an issue at the domain controller end (am assuming you have a win2k domain?)

    Author Comment

    Yes, it's a win2k domain, and the user must be logged onto the workstation to be able to access the client program.

    LVL 7

    Expert Comment

    Yes, but if a user were to login onto a workstation fresh during the time of the issue can they? This might give us an idea of whether there is a general domain issue and not due to applications run on the box.
    LVL 7

    Expert Comment

    or a problem at the DB end

    Author Comment

    turns out the IT manager was tinkering with the password security policy on the day that this was happening.  i think this solved the issue, but thanks for the suggestions.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Security Threats Are You Missing?

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    Suggested Solutions

    NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    Internet Business Fax to Email Made Easy - With eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
    Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    7 Experts available now in Live!

    Get 1:1 Help Now