Solved

Any time or login limits when using cached logins with Windows 7?

Posted on 2015-01-06
3
101 Views
Last Modified: 2015-01-06
Hi

I have a customer that is going to temporarily be moving some of there staff to new premises and keeping servers at the old one.
They will be using there old PCs, getting email over exchange https, and using an RDS server for some applications

They will be logging into there computer using cached login credentials.

Is there any limits on how long (on how many times) they can login?

It will be 2-3 months until the servers are moved to new premises
0
Comment
Question by:dolphinituk
3 Comments
 
LVL 53

Accepted Solution

by:
McKnife earned 500 total points
ID: 40533405
Cached credentials should work forever and as long as you like, but what if some bright day, one machine decides not to use those, what will you do? 2-3 days might be arguable, but months? I would be cautious.
And please note: A machine by default caches the passwords of 10 different users. So if you have computers which are used by more than 10 persons, you will have to adjust that limitation.
0
 

Author Comment

by:dolphinituk
ID: 40533406
Thanks. Each machine will be used by just 1 person
0
 
LVL 26

Expert Comment

by:Dan McFadden
ID: 40533407
There is no defined length of time that the cached credentials are valid for.  Essentially they are cached after a successfully logon event and kept until the next domain logon event.  There is a default limit of the number of cached credentials/profiles allowed (10 by default).  So if it only one user using the device, they can use their computer with no problem until the servers arrive later.

Also discussed here on EE:

http://www.experts-exchange.com/Software/Server_Software/Active_Directory/Q_23570790.html

Technical overview of Credentials Protection and Management:

http://technet.microsoft.com/en-us/library/dn408190.aspx

Dan
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Introduction: I have always been a big fan of Windows but my liking towards it is slowly being eroded by the variety of other Applications that I encounter, when I browse the Web. Most of the software available is free and maybe Open Source too. …
Log files are useful in diagnosing and repairing problems.  This is a list of common log files and their standard locations that I've compiled.   While this is not exhaustive, it is a pretty good list that I've found to be useful.  I may update it f…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now