Ah, yes... As I recall, the "encrypted" hash used for authentication is controlled by this system value... level 1 specifically removes support for "NETSERVER" password hash value (actually NTLMv2 LAN Manager hash).
That's a real problem... I wonder if Kerberos might be a way around this. I can't remember if there are restrictions for Kerberos regarding QPWDLVL.
From: MIDRANGE-L [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Tim Crowley
Sent: Thursday, May 29, 2014 9:57 AM
To: Midrange Systems Technical Discussion
Subject: RE: Using DDM between system with different QPWDLVL
Yes I have completed that on both systems.
Everything is the same on both systems except for the system value QPWDLVL (Password Level) on the source system it's set to 2 and the target it's 1.
Grattan House, Lower Mount Street, Dublin 2, Ireland | Telephone: +353-1-661 9599 The Irish Dairy Board Cooperative Limited | Registered in Dublin No. 3221R
IDB website: http://www.idb.ie
| Kerrygold website: http://www.kerrygold.com
The Irish Dairy Board was proud to receive a Ruban d'Honneur for Ireland in the 2013/2014 European Business Awards
Please consider the environment before printing this e-mail The information contained in this e-mail (and any attachments ) is confidential and may not be used by anyone other than the addressee. If you are not this intended recipient please notify us immediately. We do not accept any responsibility for the accuracy or otherwise of this message.
This email has been scanned by the Symantec Email Security.cloud service.
For more information please visit http://www.symanteccloud.com
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options,
or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l