×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
We have a customer who switched PC servers.
They are attempting to use active directories. I have done some research and
seen that there are some issues with QNTC and active directories.
They setup a local account on the PC server to circumvent the active
directories. Same userid and password as the i.
When you sign on, you can drill into the directory via QNTC. But it seems
the security is demoted to basic rights. You cannot COPY, DELETE, MOVE or
the like.
The user has full access.
I understand if there are issues with active directories, but it they setup
a local account, I would think it would work ok.
We have an internet product that can view images on the new PC server. The
internet product uses QNTC.
If you go via PC straight to the server, that same account works fine, you
have full access to the directories.
Tom Deskevich
INFOCON
814-472-6066
Fax 814-472-5019
HERE is IBM's answer to this problem. It has not been tested, but thought I
would pass it on.
We are on 6.1 operating system level BTW.
This is an either/or solution. Change the PC server or apply the PTF.
R610 SI41376 PTF enables NTLMv2 (Requires IPL)
Other option is on the AD and Local Server make sure the following
Windows Policies are changed:
Policie on windonws:
"Network Security: Do not store LANMAN Hash on next password change"
"Network Security: LAN Manager Authentication level: Send LM & NTLM -
use NTLMv2 session security if Negotiated"
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
[javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.