Kirillhome
Full Member | Редактировать | Профиль | Сообщение | ICQ | Цитировать | Сообщить модератору For Serv-U domains that use the accounts defined in Windows, either local NT-SAM accounts or the accounts from a domain controller through Active Directory, an extra tab is shown next to the Domain tab. For NT-SAM / Active Directory domains Serv-U verifies the user and password through Windows, to see if this user is defined in the Windows user database, and all access is restricted by the Windows NTFS access control settings. For NT-SAM / Active Directory domains to work, Serv-U needs a special Windows privilege, listed as "Act as part of the operating system". In case the Serv-U task is running as a system service under the default ‘LocalSystem account it will automatically have this privilege, but if it is running under any other Windows account you will have to enable this privilege for the account. You can do so through Control Panel, go to ‘Administrative Tools, select ‘Local Security Policy and from there ‘User Rights Assignment. On the right will be a list of privileges, one of them is "Act as part of the operating system", double-click it, hit ‘Add and add the name of the Windows account that is running the Serv-U task. In general, problems will be shown in the Session Log tab. Almost all the checkboxes and settings of this tab are identical to those found in the User account tabs, you can find a detailed explanation there. Only the exceptions are discussed below. The settings you enter here will be applied to every user that logs in to an NT-SAM / Active Directory domain. Windows domain name If you want Serv-U to use Windows accounts that come from a domain, to verify user credentials and NTFS access rights, enter the domain name here. Leaving this entry blank will make Serv-U use the local PCs user accounts. |