Solved

File sharing authentication when there is no domain

Posted on 2010-11-30
4
666 Views
Last Modified: 2012-06-27
I have read a lot from msdn but couldn't find anything of this case be covered:
In a Windows (XP, Vista, 7) workgroup, no domain applied, box A shares a folder with username/password (or specifies a user-account), when box B trying to map A's shared folder as local drive, what protocol is being used for authentication, Kerberos or NTLM 2? What configuration should I check if I want to force Kerberos? Any official article from MS about this?

Thank you
0
Comment
Question by:sparkythedog
  • 2
4 Comments
 
LVL 5

Expert Comment

by:rotech_IT
ID: 34241274
Active Directory is required for Kerberos authentication.

0
 
LVL 2

Expert Comment

by:kakosi
ID: 34246686
You will have to use local groups or local accounts
0
 

Accepted Solution

by:
sparkythedog earned 0 total points
ID: 34249677
The alternative NTLM protocol is used for authentication if the following conditions exist:
... ...
Computers running Windows 2000 Professional or later and Windows 2000 Server or later use the NTLM protocol to authenticate when they are not participating in a domain–that is, when they operate as stand-alone computers or as part of a workgroup.

from http://technet.microsoft.com/en-us/library/bb457114.aspx
Windows XP Professional Resource Kit
Understanding Logon and Authentication
0
 

Author Closing Comment

by:sparkythedog
ID: 34281090
Found official Microsoft statement for when NTLM is used instead of Kerberos.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Read about achieving the basic levels of HRIS security in the workplace.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question