Solved

What's the difference between the Current User and the ID I'm using to login?

Posted on 2012-03-20
13
214 Views
Last Modified: 2016-02-14
When I test the Run as feature on SSAS, what's the different between the Current User (logged in as domain\tom)  and explicitly specify to run as domain\tom?

The funny thing now is if I run as the Current User (logged in as domain\tom), I can actually browse the cube.  However if I explicitly specify to run as domain\tom, it says log in failure - unknown user name or bad password.

Btw, domain\tom is the SSAS Administrator.

Any idea?
0
Comment
Question by:thomaszhwang
  • 7
  • 6
13 Comments
 
LVL 12

Assisted Solution

by:sachitjain
sachitjain earned 500 total points
Comment Utility
Looks like very weird problem. Are you trying to connect SSAS server instance through Excel 2010? It's really difficult to figure out what the problem could be. I know it may sound really stupid suggestion but did you watch your capslock and shift key carefully while typing the password. Also the domain name. Sometimes within an organization our accounts (uid/pwd) are same within different domains and we get confused with them while connecting to different servers in different domains. Like in my organization I have same uid and pwd for my accounts in usdev and usqa domains. Such scenarios may lead to problem that you are stating; current user since it would pick correct domain with your username so it would allow you to connect but explicitly entered username and password may have incorrect domain name. I am sure you must have gone through these checks but just to double check. Check the domain of machine you are trying your connection on. It would confirm it for you.
0
 

Author Comment

by:thomaszhwang
Comment Utility
I'm connecting directly from BIDS.  No need to type the password - using Windows Authentication.

I do need to check since my domain is a sub domain of a large one.  I'm not sure if they are doing synchronization or what - need to find out.
0
 
LVL 12

Assisted Solution

by:sachitjain
sachitjain earned 500 total points
Comment Utility
You said you face issue when you explicitly specify user to run as domain\tom and you are able to browse cubes when you use current user right? So current user I believe is the user through which you have logged-in into the machine where you are trying your connection through BIDS. Could you please check domain of that machine? Is it same as that in "domain\tom"?
I think you are right issue might be due to your sub-domain/domain synchronization too.
0
 

Author Comment

by:thomaszhwang
Comment Utility
However I did log in the Windows as domain\tom.
0
 
LVL 12

Assisted Solution

by:sachitjain
sachitjain earned 500 total points
Comment Utility
Thats what. You mentioned domain\tom as user you logged in with and you also mentioned that your domain is a sub domain of a large one so might be possible that when you are choosing current user to connect then you are actually not being impersonated exactly as domain\tom but as <large domain name>\tom or <sub domain name>\tom. I want you to check what is considered as domain while connecting through current user. Is domain in "domain\tom" name of sub domain or large domain? I believe resolving confusion between these two could resolve your issue.
0
 

Author Comment

by:thomaszhwang
Comment Utility
Well, actually I'm not sure if we really have a <sub domain name>.  We always use the <large domain name> to log in.

Can you point me to something like the different ways we can architect this large domain - sub domain environment?  I suppose we can do synchronization.  Can we do like directly authenticating by using the large domain controller?  If we are directly authenticated by the large domain controller, meaning there is no directory information stored on my local domain controller, right?

I also remember there is something called Trusted Domain?  I'm not sure if this is really our case here - just wondering.

Thanks.
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 12

Assisted Solution

by:sachitjain
sachitjain earned 500 total points
Comment Utility
You would have to take help of your infrastructure's team to understand domain architecture of your organization.

Can you get me the machinenames for your local machine where BIDS is installed and SSAS server? Something like x.y.z.com where x is machine name and y.z.com is domain. If you are not comfortable sharing them here due to confedentiality reasons then you could mask them. I just want to know if y.z.com part is same for both machines or not.
0
 

Author Comment

by:thomaszhwang
Comment Utility
I'm directly using BIDS on the SSAS server which is the DC of the sub domain.
0
 
LVL 12

Assisted Solution

by:sachitjain
sachitjain earned 500 total points
Comment Utility
So howz your SSAS server name look like in x.y.com format? Moreover is y.com in this name is same as that of domain in "domain\tom"?
0
 

Author Comment

by:thomaszhwang
Comment Utility
I just confirmed with my system administrator.  There is no subdomain.  The server is just a regular server in the domain.  It's not a domain controller.  There is only one domain.

Any idea?
0
 
LVL 12

Accepted Solution

by:
sachitjain earned 500 total points
Comment Utility
This information makes it even more weird. Could you please verify, what I said earlier, howz your SSAS server name look like in x.y.com format? Moreover is y.com in this name is same as that of domain in "domain\tom"?
0
 

Author Comment

by:thomaszhwang
Comment Utility
Ok, will do when I have a chance.  However when I tested earlier, I was testing directly on the server, so I was using localhost.

Btw, everything was working fine in the past.
0
 

Author Closing Comment

by:thomaszhwang
Comment Utility
Thanks.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Everyone has problem when going to load data into Data warehouse (EDW). They all need to confirm that data quality is good but they don't no how to proceed. Microsoft has provided new task within SSIS 2008 called "Data Profiler Task". It solve th…
In this article we will get to know that how can we recover deleted data if it happens accidently. We really can recover deleted rows if we know the time when data is deleted by using the transaction log.
Via a live example, show how to set up a backup for SQL Server using a Maintenance Plan and how to schedule the job into SQL Server Agent.
Via a live example, show how to shrink a transaction log file down to a reasonable size.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now