[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

authenticate by profile instead of machine name

Posted on 2013-01-16
3
Medium Priority
?
185 Views
Last Modified: 2013-01-17
Because network users authenticate by profile instead of machine name, everyone must build their initial profile on a hardwired connect.  Once the profile is built, users can log-on wirelessly.  Is it possible to build the initial profile via a wireless connection?
Thanks

Ken
0
Comment
Question by:kenjk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 20

Accepted Solution

by:
wolfcamel earned 2000 total points
ID: 38784923
wireless isn't a problem if it is on the same network, and uses the AD server for DNS.

If the machine is in another location, such as at home or on a mobile network - then you need to connect to a VPN first, then login.
Assuming the machine is on the domain and you have VPN configured, when you create the vpn connection on the client machine there is a box - make connection available to all users - then you will be able to log in via VPN connection on the initial login screen - this will then create a profile as you wish.
0
 

Author Comment

by:kenjk
ID: 38785033
Awesome job... Thank you

Ken
0
 

Author Closing Comment

by:kenjk
ID: 38787311
Thank you so much

Ken
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nslookup is a command line driven utility supplied as part of most Windows operating systems that can reveal information related to domain names and the Internet Protocol (IP) addresses associated with them. In simple terms, it is a tool that can …
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question