× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Hello Rob

After several experimentation
(consisting mainly of different settings on the Windowz server and setting
new "shared" PWDs)
We've found that the Windows domain' "shared" user (the one having
identical PWD on the i and the domain)
has developed a kind of recalcitrance and would not cooperate.

We have created *local *users on the Windows servers in question and these
local users proved to do the trick.

Thanks
Gad




date: Wed, 5 Jun 2024 10:54:59 -0400
from: Rob Berendt <robertowenberendt@xxxxxxxxx>
subject: Re: Placing files in Windowz file server directory using QNTC

Numerous possibilities.
Tightened security on the directories involved on that server.
Tightened security on the share involved on that server.

Then again a google search on qntc cpfa09c shows a ptf which came out in
March.

https://www.ibm.com/mysupport/s/defect/aCI3p000000XdLr/dt119296?language=en_US

On Wed, Jun 5, 2024 at 3:42?AM Gad Miron <gadmiron@xxxxxxxxx> wrote:

Hello Folks

For quite some time I have been placing files in Windows file server'
directories
using QNTC and a special USRPRF that has identical credentials (user &
pwd)
on the Windows domain and the i.

Lately something broke and I get a CPFA09C
Not authorized to object. Object is/QNTC/FILE_SERVER/SOME_DIR/SOME_FILE


Anyone in the know?

TIA
GAD



As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.