472,328 Members | 1,168 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 472,328 software developers and data experts.

Any ideas? Authentication problem with .NET application

How do I get a remote XP Pro computer user on one domain to access and run a
..NET application on a different domain?

Scenario: I was given a .NET application on domain (B) that I need to allow
a remote XP PRO computer user to run from the other domain (A). The only way
I have been able to get the application to run remotely is by having the XP
PRO computer belong to domain (B) where the application resides, and using
"RUN AS" under an authorized user of domain (B) credentials. I was not able
to get the application to run if the XP PRO PC was made part of a Workgroup,
although I did have access to the network. Is there a way of running an
application on the remote domain (B) using, "RUN AS", with the authorized
user's credentials (B), but not having the XP PRO computer a member of the
domain (B)?

The following is how the .NET application
authentication progressed before it failed:

Name: domain(A)\ username
Is Authenticated: True
Authentication Type: NTLM
Is In domain(B)\ Net Application Users*: False

*( W2000 AD Global Security Group authorized to use the .Net Application)
Also was not able to run the application using "Run As" a known authorized
username@domain(B).

When the XP Pro PC is then made a member of domain (B), here is the .NET
application authentication progress and it run successfully:

Name: domain(BE)\ username
Is Authenticated: True
Authentication Type: NTLM
Is In domain(B)\ Net Application Users*: True

Also am able to "Run As" with any other authorized username@domain(B)

Appreciate any and all suggestions,
robert
Jul 21 '05 #1
0 1213

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

8
by: Bob Everland | last post by:
I have an application that is ISAPI and the only way to secure it is through NT permissions. I need to have a way to login to windows...
6
by: Billy Jacobs | last post by:
I have a website which has both secure and non-secure pages. I want to uses forms authentication. How do I accomplish this? Originally I had my...
4
by: Jay | last post by:
I have authentication set for my site but I need one page to be an exception case. Namely my forgot password page. How do I tell the webconfig file...
9
by: Tom B | last post by:
In my web.config file I've specified Windows for the authentication, in IIS I've set it to Integrated Authentication. But my SQL connection is...
3
by: Kris van der Mast | last post by:
Hi, I've created a little site for my sports club. In the root folder there are pages that are viewable by every anonymous user but at a certain...
0
by: Anonieko Ramos | last post by:
ASP.NET Forms Authentication Best Practices Dr. Dobb's Journal February 2004 Protecting user information is critical By Douglas Reilly Douglas...
4
by: Bennett Haselton | last post by:
If I add this to my web.config file: <authentication mode="Forms"> <forms name=".ASPXUSERDEMO" loginUrl="login.aspx" protection="All"...
0
by: robert | last post by:
How do I get a remote XP Pro computer user on one domain to access and run a ..NET application on a different domain? Scenario: I was given a...
9
by: dana lees | last post by:
Hello, I am developing a C# asp.net application. I am using the authentication and authorization mechanism, which its timeout is set to 60...
0
by: tammygombez | last post by:
Hey fellow JavaFX developers, I'm currently working on a project that involves using a ComboBox in JavaFX, and I've run into a bit of an issue....
0
by: tammygombez | last post by:
Hey everyone! I've been researching gaming laptops lately, and I must say, they can get pretty expensive. However, I've come across some great...
0
by: teenabhardwaj | last post by:
How would one discover a valid source for learning news, comfort, and help for engineering designs? Covering through piles of books takes a lot of...
0
by: Kemmylinns12 | last post by:
Blockchain technology has emerged as a transformative force in the business world, offering unprecedented opportunities for innovation and...
0
by: CD Tom | last post by:
This happens in runtime 2013 and 2016. When a report is run and then closed a toolbar shows up and the only way to get it to go away is to right...
0
by: Naresh1 | last post by:
What is WebLogic Admin Training? WebLogic Admin Training is a specialized program designed to equip individuals with the skills and knowledge...
0
jalbright99669
by: jalbright99669 | last post by:
Am having a bit of a time with URL Rewrite. I need to incorporate http to https redirect with a reverse proxy. I have the URL Rewrite rules made...
0
by: antdb | last post by:
Ⅰ. Advantage of AntDB: hyper-convergence + streaming processing engine In the overall architecture, a new "hyper-convergence" concept was...
0
by: AndyPSV | last post by:
HOW CAN I CREATE AN AI with an .executable file that would suck all files in the folder and on my computerHOW CAN I CREATE AN AI with an .executable...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.