Solved

Active Directory Log-Ons

Posted on 2006-07-08
8
318 Views
Last Modified: 2010-03-19
How can one tell how a PC is configured to allow users to authenticate? If I recall right, you can go to "My Computer," right-click and select "manage"...(?) And I forgot the rest.

In other words, we have an AD server on our local network, which we authenticate to when we are plugged into the local segment. Each person has an Active Directory profile/account, of course. yadda yadda yadda...

OK...but we also use our laptops out in the field, and I know we are not authenticating to any server when we are out in the field. We power up the laptop, enter our log-on credentials when prompted, and then the laptops boot up to the correct profile and we go on our merry way.

So, how can I access the configurations on my PC that dictate how a user will authenticate in each situation? After I view the configs, I will either have my other questions answered or I will ask some more.

Thank you to all in advance
0
Comment
Question by:ex-engineer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
8 Comments
 
LVL 22

Accepted Solution

by:
Rick Hobbs earned 63 total points
ID: 17066453
If you right-click on "My Computer" and go to "Properties", Click on the "Computer Name" tab.  If it has a Domain field and a name in the field, you are authenticating to that AD server.  If you select the "Advanced" tab and hit the "Settings" button, you will see what user profiles are on that machine.  The user profile and login password are cached unless you have turned of caching in Local Security.
0
 
LVL 1

Author Comment

by:ex-engineer
ID: 17069111
OK...but we also use our laptops out in the field, and I know we are not authenticating to any server when we are out in the field. The AD server sits on a private network behind a router and port forwarding is turned off.

We power up the laptop, enter our log-on credentials when prompted, and then the laptops boot up to the correct profile and we go on our merry way. What is the chain of events that takes place right after you turn on the PC when it is out in the field?
0
 
LVL 12

Assisted Solution

by:r_naren22atyahoo
r_naren22atyahoo earned 62 total points
ID: 17069932
>>>So, how can I access the configurations on my PC that dictate how a user will authenticate in each situation? After I view the configs, I will either >>>have my other questions answered or I will ask some more.

Right Click My Computer,
manage
Local Users and Groups>>Expand
Groups
on Right double click power users
click add
click on locations
select domain
Enter domainName\loginName
click OK
now it will add a login some thing like this loginname@domainname.local

Now this login will have rights to login locally and as power user
when on domain the login scripts will be executed.

regards
naren

0
Manage your data center from practically anywhere

The KN8164V features HD resolution of 1920 x 1200, FIPS 140-2 with level 1 security standards and virtual media transmissions at twice the speed. Built for reliability, the KN series provides local console and remote over IP access, ensuring 24/7 availability to all servers.

 
LVL 12

Expert Comment

by:r_naren22atyahoo
ID: 17069939
this has to be done while in the domain, they way the same profile will be used when out of domain
0
 
LVL 22

Expert Comment

by:Rick Hobbs
ID: 17070282
WHen you are out in the field it authenticates to the cached credentials and profiles.  That is the default action of XP.
0
 
LVL 1

Author Comment

by:ex-engineer
ID: 17072566
Thanks for all the information, folks! You have a been a great help and I appreciate it. I will check this out and be back.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question