|
from: Tom Deskevich <TDeskevich@xxxxxxxxxxxxxxxxxx>
subject: QNTC with same user acts differently when accessing a Windows
server
I have a windows server with a QNTC path established on our I and on a
remote I. There is a user that exists on my I and on a remote I with the
same credentials. I have verified that this user has full access to the
windows server path I am using. When I remote in via telnet I have full
access. When I try to write/delete/rename to the same path, on our I,
CPFA09C is issued, not authorized to the object. I can read from the path
on my local I via QNTC. The windows server resides on the same network
with the remote I, but I cannot see how that makes any difference. I can
write to a folder on another windows server via QNTC on our I with the same
credentials.
Tom Deskevich
Programmer/Analyst
P: 814-472-6066 x201134
F: 814-472-5019
E: TDeskevich@xxxxxxxxxxxxxxxxxx
172 Gateway Road PO Box 568
Ebensburg, Pennsylvania
15931
www.harrislocalgov.com
This message has been sent on behalf of a company that is part of the
Harris Operating Group of Constellation Software Inc.
If you prefer not to be contacted by Harris Operating Group please notify
us.
?
?This message is intended exclusively for the individual or entity to
which it is addressed. This communication may contain information that is
proprietary, privileged or confidential or otherwise legally exempt from
disclosure. If you are not the named addressee, you are not authorized to
read, print, retain, copy or disseminate this message or any part of it. If
you have received this message in error, please notify the sender
immediately by e-mail and delete all copies of the message.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.