Using LDAP authentication on a domain, is it possible for users to get authenticated when they log on onto their machine without the need to enter the driver properties and reentering their data (like Equitrac does)?
Authentication question
Collapse
X
-
Authentication question
' "But the salesman said . . ." The salesman's an asshole!'
Mascan42
'You will always find some Eskimo ready to instruct the Congolese on how to cope with heat waves.'
Ibid
I'm just an ex-tech lurking around and spreading disinformation!Tags: None -
Re: Authentication question
As far as the driver properties go, almost certainly not. However they may be able to have a pop-up window rather than having the details resident in the driver.
When you say "re-entering their data", what do you mean?
Do they have a script running to install the printer? Are they using roaming profiles? Do they hot-desk?
Oh, and what package are you using the LDAP authentication for? -
Re: Authentication question
As far as the driver properties go, almost certainly not. However they may be able to have a pop-up window rather than having the details resident in the driver.
When you say "re-entering their data", what do you mean?
Do they have a script running to install the printer? Are they using roaming profiles? Do they hot-desk?
Oh, and what package are you using the LDAP authentication for?
About the rest of your questions, I don't know, since this is still a first contact for a possible sale.' "But the salesman said . . ." The salesman's an asshole!'
Mascan42
'You will always find some Eskimo ready to instruct the Congolese on how to cope with heat waves.'
Ibid
I'm just an ex-tech lurking around and spreading disinformation!Comment
-
Re: Authentication question
If the customer's domain is Windows/Active Directory you could use Windows Authentication instead of LDAP Authentication. This would then negate the need for user to populate their identity/credentials, their Windows login credentials would be used. Access/Restriction to device functions would be achieved by adding users to the appropriate security group.Comment
Comment