Solved

Server 2003 to 2008 Domain trust user not being accepted in 2008 domain share

Posted on 2012-04-09
3
397 Views
Last Modified: 2012-04-10
I have a domain user in a 2003 domain in a remote location. They are attempting to connect to a 2008 domain shared drive via a domain trust.  The machine she is connecting from is on Domain a (2003 domain) the share is Domain B (2008) the username has been added to the share with full control but when I attempt a connection it still asks for the password as if my credentials are bad.

Other users don't have this issue.

There is an identical username in both domains (maybe that's the issue?)

I have attempted to manually add the drive using user/pass format as follows:

DomainA\username
password
0
Comment
Question by:MitchViste
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
DLeaver earned 500 total points
ID: 37826646
Hi

Does the identical account in domain B have the same username and password as the account in domain A?  If they are not then thats the source of the problem
0
 

Author Comment

by:MitchViste
ID: 37827779
So I'll have to change the password for it each time Domain A changes the password for that account?
0
 
LVL 12

Expert Comment

by:DLeaver
ID: 37828083
Well I think you would have to yes, either that change the login name for that user in either domain so the accounts are not identical
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses
Course of the Month4 days, 15 hours left to enroll

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question