"Tom van Stiphout" <to*****@no.spam.cox.net> wrote in message
news:eh********************************@4ax.com...
On Mon, 15 Dec 2003 09:15:57 -0000, "Mike MacSween"
<mi******************@btinternet.com> wrote:
What do you have in mind? A procedure to use network resources
without being validated by the server? And then presumably go where
you want to, defeating the entire Windows security infrastructure? No
way, Jose!
Mmm. Perhaps I didn't explain that very well.
Take this scenario. The user boots the workstation and chooses the 'logon to
xxxxx (this machine)'. In other words they aren't logging on to the network
domain. But the BE of the database lives on the server. So when they open
the FE - no records! Here I find that if I navigate to the server from
Explorer first, which will involve a 'enter the user name and password of a
user with rights to blah blah' I can open the FE, with records.
Does that make sense? Maybe not.
The reason? This user appears to 'have to' log on to the local machine
because of some licensing restriction with their accounting software. I
think they'd have to buy another licence if she logged onto the network. But
today she was fairly adamant she _didn't_ want access to the database, so
problem solved.
I agree. I'd rather work within the Windows security infrastructure, the way
it's meant to be.
Cheers, Mike