Solved

How to connect to a network share while supplying alternate credientials?

Posted on 2009-07-15
3
271 Views
Last Modified: 2012-05-07
Our Techs have access to a network share, but the end users do not.  When the tech sits down at a user's computer they currently log off and on as themselves to access the share.  

How can they supply their own credientials for the share while another user is logged on?
0
Comment
Question by:trsman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 11

Expert Comment

by:ecsrd
ID: 24864359
From a command prompt:

net use driveletter: \\computername\share /user:domainname\username should do the trick for you.  If the share is already mapped using credentials, replace the computername with its IP address.

That should do the trick for you.
0
 
LVL 11

Accepted Solution

by:
ecsrd earned 400 total points
ID: 24864372
" If the share is already mapped using credentials" should read: "If a share is already mapped using the credentials of the locally logged on user, and you want to use alternate credentials"
0
 
LVL 3

Assisted Solution

by:ZuluGr
ZuluGr earned 100 total points
ID: 24867362
If the share is already mapped, try to do a "net use" and see the mapping, then do a "net use X (driveletter) /delete.
then you will be able to remap it using the creds you need.
0

Featured Post

Percona Live Europe 2017 | Sep 25 - 27, 2017

The Percona Live Open Source Database Conference Europe 2017 is the premier event for the diverse and active European open source database community, as well as businesses that develop and use open source database software.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses
Course of the Month6 days, left to enroll

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question