?
Solved

Why do I have to keep entering domain\username to logon?

Posted on 2007-11-27
5
Medium Priority
?
286 Views
Last Modified: 2010-04-20
When logging on to Terminal Services or OWA or certain servers I have to enter domainname\username even thought sometimes the domain name is displayed. Is there any way of stopping having to enter the domain name before the username?
0
Comment
Question by:goldsmithwilliams
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 31

Expert Comment

by:merowinger
ID: 20357499
Outlook Web Access? Its always so....u also can type in the Mail Address
0
 

Author Comment

by:goldsmithwilliams
ID: 20357544
What about logging on remotely via a VPN the RDP connection?
0
 
LVL 31

Expert Comment

by:merowinger
ID: 20357567
then u need to publish owa in your internal network, too!
0
 

Author Comment

by:goldsmithwilliams
ID: 20357674
Sorry I didnt say that right, you have to do domain\username even via VPN and RDP. If it cant be changed then why do you need to do it?
0
 
LVL 25

Accepted Solution

by:
mikeleebrla earned 1000 total points
ID: 20358465
>>Outlook Web Access? Its always so....u also can type in the Mail Address

not true... all you have to do is go into the IIS authentication methods section on the "exchange" virtual directory and set the default domain to "\"  (without the quotes) and set it to "basic authentication"

Yes it isn't as secure but it can be done.

0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
Suggested Courses
Course of the Month8 days, 9 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question