Novell Login Issues

Posted on 2009-02-19
Last Modified: 2012-06-21
I work for a school district in Texas, and we are running Novell ZenWorks 10, and we have been having a wide spread issue with log in's.  There is no consistency, with either the computer, or user.  When the user enters their Username, and Password a second "Windows Workstation" window comes up.  The same user can go to the computer right next to them and it will login just fine.  Sometimes a simple restart will allow them to log in.  If not our current solution is the following steps:

1)zac unr
2)zac unr -f
3)zac cc
4)zac reg xxxx

Then the computer will login just fine for awhile.

There has to be something wrong here.  Any thoughts or suggestions will be much appreciated.
Question by:cchappellwest
    LVL 35

    Expert Comment

    Is ZEN 10 running on Windows or Linux or OES?

    Are you using the Novell client32 at all, or just the management agent?
    LVL 3

    Expert Comment

    And isn't there problem with storing "novell" password as windows user paswords. So if one user login to novell his password is stored as local user passoword?
    LVL 35

    Accepted Solution

    With ZENworks Configuration Management 10, you don't need a "novell" password.  It can use LDAP authentication.

    It can't use AD for LDAP auth, though, unless you configure it to use Windows' flavor of Kerberos - if that's possible (don't know...).  LDAP SSL auth (the NORMAL way to do LDAP auth) won't work against AD...

    If it's using eDirectory, they could be using  the "universal" password feature of NMAS, or if they have a modern Novell OS like OES2, they could even join their server to the AD domain as a DC, so the idea of a "novell" password is a long shot, at best.  


    Author Comment

    "Is ZEN 10 running on Windows or Linux or OES?"

    It is running on SLES

    "Are you using the Novell client32 at all, or just the management agent?"

    Yes we are running Novell client32

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Setting up SSH Cisco We are all told that you should not use Telent for connecting to devices because it is unsecure and all clear text. Much better is to use SSH, but it can seem a bit of a challenge setting it all up and especially in a small n…
    Outsource Your Fax Infrastructure to the Cloud (And come out looking like an IT Hero!) Relative to the many demands on today’s IT teams, spending capital, time and resources to maintain physical fax servers and infrastructure is not a high priority.
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now