Solved

Any time or login limits when using cached logins with Windows 7?

Posted on 2015-01-06
3
102 Views
Last Modified: 2015-01-06
Hi

I have a customer that is going to temporarily be moving some of there staff to new premises and keeping servers at the old one.
They will be using there old PCs, getting email over exchange https, and using an RDS server for some applications

They will be logging into there computer using cached login credentials.

Is there any limits on how long (on how many times) they can login?

It will be 2-3 months until the servers are moved to new premises
0
Comment
Question by:dolphinituk
3 Comments
 
LVL 53

Accepted Solution

by:
McKnife earned 500 total points
ID: 40533405
Cached credentials should work forever and as long as you like, but what if some bright day, one machine decides not to use those, what will you do? 2-3 days might be arguable, but months? I would be cautious.
And please note: A machine by default caches the passwords of 10 different users. So if you have computers which are used by more than 10 persons, you will have to adjust that limitation.
0
 

Author Comment

by:dolphinituk
ID: 40533406
Thanks. Each machine will be used by just 1 person
0
 
LVL 26

Expert Comment

by:Dan McFadden
ID: 40533407
There is no defined length of time that the cached credentials are valid for.  Essentially they are cached after a successfully logon event and kept until the next domain logon event.  There is a default limit of the number of cached credentials/profiles allowed (10 by default).  So if it only one user using the device, they can use their computer with no problem until the servers arrive later.

Also discussed here on EE:

http://www.experts-exchange.com/Software/Server_Software/Active_Directory/Q_23570790.html

Technical overview of Credentials Protection and Management:

http://technet.microsoft.com/en-us/library/dn408190.aspx

Dan
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes how to set permissions to allow a limited-permissions user to start and stop a particular System Service.   It is always best to give users only the permissions that they need to perform their job, so tweaking particular permi…
The way I use Experts Exchange to assist me in analyzing and diagnosing a problem is I first enter a Verbose Question at Experts Exchange like: Office 2007 will hang when opening and saving files I then launch WordPad (any text editor will do) an…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now