Solved

Mapping to network drive using two different credentials simultaneously (WinXP Pro)

Posted on 2006-11-19
8
976 Views
Last Modified: 2011-10-03
Hi,
I have a program which should map a drive (e.g. P:\ ) to a network-share (e.g. \\MyServer\Folder1)
This program runs in the background under another user-account from the currently logged in user (account of logged in user: JoeSmith, Program's user account: Administrator)

The currently logged in user has also mapped to the network share, but using different credentials. - i.e. he has different permissions.

I have no test-environment where I could test it.
Will there be any conflict in provided credentials if both - my Program (startet as Administrator) and JoeSmith work on same PC simultaneously?

Thanks,

Sina

PS: Since I need this urgently any comment is appreciated and accepted answer will be a big A; thanx.
0
Comment
Question by:falahati_sina
8 Comments
 
LVL 32

Assisted Solution

by:rsivanandan
rsivanandan earned 50 total points
Comment Utility
As long as you have set permissions on the remote share (both security & sharing), then I don't see any problem why it shouldn't work!

Cheers,
Rajesh
0
 
LVL 3

Assisted Solution

by:Skyccord
Skyccord earned 100 total points
Comment Utility
Falahati_sina,
It will not work properly.  The reason this is said is that Windows does not like two connections to one particular device with two different set of credentials.  And if I understand you correctly BOTH accounts are logging into the SAME exact share.  And that's where your problem lies.

Stanley Louissaint
0
 

Author Comment

by:falahati_sina
Comment Utility
Thanks for your comments...

do you suggest any other way to solve the same?
0
 

Author Comment

by:falahati_sina
Comment Utility
I should point out that these are not two logged in users, but one logged in user and a program (service) running under a different user-account.
Does this make any difference?
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 63

Assisted Solution

by:SysExpert
SysExpert earned 100 total points
Comment Utility
1) Either delete one of the shares, or make sure that they use different Drive letters.

Any reasonalby intelligent batch file can figure out what the first free drive letter is and use it.

You should not even be having an issue if the programs are correctly written.

I hope this helps !
0
 
LVL 43

Accepted Solution

by:
Steve Knight earned 250 total points
Comment Utility
It shouldn't be an issue. You can't map a drive under userA's login using a different set of credentials on the same server.  e.g.

x: \\servera\share   as user1

try to map y: to \\servera\othershare   as user2  and you will get clash of credentials

However if you runas /user:otheruser cmd.exe
then do
net use y: \\severa\othershare

you will notice it works - at the same time as the other user but of course usera sees the X: drive and userb sees their mapped drive (only)

In other words the credntial clash only occurs from the same USER accessing the remote server as two different usernames.  Other users on the same machine can do it.

Steve
0
 

Author Comment

by:falahati_sina
Comment Utility
As dragon-it pointed out, I think since I am using two users the clash should be avoided...
I will try out on release environment and hope it will work. If not, I will repost the question...
Thank you all for commenting.
Regards,
Sina
0
 
LVL 43

Expert Comment

by:Steve Knight
Comment Utility
No problem
Steve
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
LAN or WAN ? 11 58
Cisco switch SVI 17 39
Cisco VSS or VCP on GNS3 or IOU 3 27
vMotion VLAN or just any IP address will do ? 8 26
Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now