Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Perplexing Permission Issue

Posted on 2008-06-10
2
Medium Priority
?
193 Views
Last Modified: 2013-12-04
I have been working with Microsoft servers for awhile but I have to admit that I am completely stumped on this one.  Here's my scenario:

There is a network application installed on my server, where the executable folder is shared out to the appropriate users.  The client installs the client side of the app to their computer which creates a shortcut to the executable on the server.  

Here's what I can't figure out.  I have a user john.doe, that has been granted the appropriate permissions on that executable folder and he can launch the executable with no problem from any computer over the network EXCEPT...from another server.  If I logon to another 2003 R2 server locally or by terminal services under john.doe's credentials and try to access this executable, which is located on a another server I get the following error: "Windows cannot access the specified device, path, or file.  You may not have the appropriate permissions to access the item".  From any other computer on the network I can launch the executable by using the UNC path.

Any suggestions?  Thanks.
0
Comment
Question by:phcc75
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
Compaq_Engineer earned 1000 total points
ID: 21751747
Does the server have the Internet Explorer Enhanced Security  installed?  We have to uninstall this on our terminal servers to allow several programs to run.
0
 

Author Closing Comment

by:phcc75
ID: 31465762
That was it!!!  I would have never have guessed that.  Who would ever have guessed that an IE setting would interfere with network permissions!  Thanks
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question