Yesterday I moved a Windows app from a W2008 Server to a Windows 7 Pro
workstation, both 64-bit.

The IBM i (7.1) creates a file in the IFS that will be input to this app,
then copies that file onto the Windows machine via the CPY command like

CPY OBJ('/UserFolders/file.txt') TODIR('/qntc/workstationname/temp')

This worked fine on the W2008 Server, but fails on the Win7 workstation
with "CPDB053 Error exchanging security information for user JEFF on
network server <pcname>." The explanation goes on to say "Cause . . . . .
: The IBM i NetClient (QNTC) file system has encountered an
error when authenticating user JEFF with a network server <pcname>."

1) The workstation in question has c:\temp shared as temp with everyone
having read/write access. (Same as the W2008 server it used to be on).

2) My user ID, JEFF, has the same password on the IBM i and the Windows
domain. Neither the workstation where this does not work nor the server
where it does work have a local user JEFF. User JEFF only exists on the
domain and the IBM i.

3) If I WRKLNK and drill into QNTC, I can see both the W2008 Server and the
workstation. If I drill into the W2008 Server I see the temp share defined
on it. If I drill into the workstation I do not see the share. I created
a temp share on my Win7 desktop and it doesn't work there either.

4) File and Print sharing is enabled and allowed through the firewall.

5) Windows explorer can see the temp share on the Win7 workstations. It's
the IBM i that cannot.

I found threads where this was an issue in 5.4 and 6.1, fixed by PTFs. I
must be missing something obvious.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2021 by and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.