2. Windows networking logon
2.1 Standard login procedure
2.2 Login procedure for pupils using a nest account
2.3 Login procedure for pupils using an individual account
2.4 When things go wrong
In a secure server, all users have their own 'space' where their files are stored. This space is called the 'home directory' or 'home folder'. Personal documents and files are not stored on a workstation but in this home directory on the server.
In order to access documents and files in your home directory on the server, you have to tell the server who you are. You can do that by providing your 'user name'. This is sometimes called your 'userid' which is short for 'user identification'. By supplying your user name, the server 'knows' which directory is your home directory and which documents and files are yours.
However, you also have to prove that you are who you say you are. If you did not have to prove your identity, anyone knowing (or guessing) your user name would be able to access your documents and files. You can prove your identity by presenting a secret password to the server. Access to your documents and files is granted when your secret password matches that of your user name.
In computer jargon, the process of telling the server who you are (and proving it) is 'logging in' or 'logging on'. The reverse process - disconnecting from the server - is called 'logging out' or 'logging off'.
Note that it is very important to keep your secret password a secret. If your password falls into the wrong hands, all your documents and files may fall in the wrong hands too. Therefore you should not write down your password on a little PostIt-note and attach it to the computer screen. Also, you should not keep your password in the top right drawer of your desk or taped to the bottom of the keyboard; these places are well-known. Best is to simply memorise your password.
The process of providing a user name and a password is not tied to a particular workstation; you can use any workstation on the network. It does not matter which workstation you use. This is a big advantage of the network; you can pick any available workstation, log on and start working on your own documents and files. Since the documents are stored on the server and not on the workstation, there is no need to work on a particular computer to access the documents and files. Note that this also implies that there is no such thing as your 'personal' computer. Anyone could use any workstation to access their own documents and files on the server.
[Esc]
,
[Spacebar]
, [Enter]
.
[Alt]
key and hitting the [U]
key or
pressing and holding the [Shift]
key and hitting the
[Tab]
key are shown as [Alt-U]
and
[Shift-Tab]
respectively.
[Enter]
or by
using the appropriate keyboard shortcut,
e.g. [Alt-K]
.
[Ctrl-Esc]
)
[Enter]
or clicking on the menu
item 'Settings' once using the left hand mouse button
[Enter]
or clicking on the menu
item 'Printers' once using the left hand mouse button
NOTICE: Please do keep your password to yourself. Do not share it with others and do not write it down on a PostIt note attached to the computer. Your secret password is the key to your personal documents and files. By sharing your password, you allow others to access your files. Please memorise your password and keep it secret.
hparkh
ahgiesah
EXEMPLUM
Take the following steps to log on to the network.
[Alt-U]
key combination on your
keyboard brings you to the 'User name' field in a single
step.
[Tab]
key repeatedly until the
cursor appears in the field. After every [Tab]
the cursor moves to the next field.
[Shift-Tab]
key combination
repeatedly until the cursor appears in the field. After every
[Shift-Tab]
the cursor moves to the previous
field. Sometimes this is faster than [Tab]
.
[Del]
or [BackSpace]
repeatedly.
[Enter]
key just yet.
[Tab]
key once. (You can also hit
[Alt-P]
or use the mouse). The 'Password' field is
always empty.
[Enter]
key just yet.
[Tab]
,
[Alt-D]
or by using the mouse) and type the required
information into the field. Do not hit the
[Enter]
key just yet.
[Enter]
key or by pressing the [OK] button using
the mouse.
The fact that the window with black background appears on screen indicates that the workstation has made contact with the network server.
This message is shown only for a brief moment.
You can verify that the network logon was completed successfully by
inspecting the Start Menu. If you open this menu, by pressing the
[Start] button in the lower left corner of the screen or by hitting
the [Ctrl-Esc]
key combination, you will see an entry 'Log Off
Hparkh', as illustrated below.
Press the [Start] button again to close the menu.
Please refer to section 2.4 When things go wrong if you encounter problems with the login procedure.
Depending on the school's policy a nest account can have a regular password, just like any other account, or the account can have no password at all.
If the nest account does have a password, the procedure from section 2.1 Standard login procedure above applies. If the nest account has no password, the login procedure is slightly different. This is illustrated below using the account information of grade 3 (see section 2. The Exemplum Primary School in chapter II. ServerAtSchool User Manual Overview).
grade3
EXEMPLUM
Take the following steps to log on to the network using this account.
[Alt-U]
key combination on your
keyboard brings you to the 'User name' field in a single
step.
[Tab]
key repeatedly until the
cursor appears in the field. After every [Tab]
the cursor moves to the next field.
[Shift-Tab]
key combination
repeatedly until the cursor appears in the field. After every
[Shift-Tab]
the cursor moves to the previous
field. Sometimes this is faster than [Tab]
.
[Del]
or [BackSpace]
repeatedly.
[Enter]
key just yet.
[Tab]
,
[Alt-D]
or by using the mouse) and type the required
information into the field. Do not hit the
[Enter]
key just yet.
[Enter]
key or by pressing the [OK] button using
the mouse.
The fact that the window with black background appears on screen indicates that the workstation has made contact with the network server.
This message is shown only for a brief moment.
You can verify that the network logon was completed successfully by
inspecting the Start Menu. If you open this menu, by pressing the
[Start] button in the lower left corner of the screen or by hitting
the [Ctrl-Esc]
key combination, you will see an entry 'Log Off
Grade3', as illustrated below.
Press the [Start] button again to close the menu.
Please refer to section 2.4 When things go wrong if you encounter problems with the login procedure.
Depending on the school's policy such an individual account can have a regular password, just like any other account, or the account can have no password at all.
If the individual pupil's account does have a password, the procedure from section 2.1 Standard login procedure above applies. If the individual pupil's account has no password the procedure from section 2.2 Login procedure for pupils using a nest account above applies.
Please refer to section 2.4 When things go wrong if you encounter problems with the login procedure.
The previous sections document the cases where nothing goes wrong during the login procedure. However, there are many reasons why the login procedure may fail. Some of the more common causes are discussed below.
Freddie Frinton was here. He was the last one to use this workstation (Freddie's userid is 'ffrint') and Windows has remembered the name of the last user that logged in.
It is also possible that you will see some text that does not look like a user name, as illustrated below.
The software on the workstation was renewed and you happen to be the first user to log in after this has happened.
Either way you can simply remove the existing information by
[Alt-U]
key combination on your
keyboard brings you to the 'User name' field in a single
step.
[Tab]
key repeatedly until the
cursor appears in the field. After every [Tab]
the cursor moves to the next field.
[Shift-Tab]
key combination
repeatedly until the cursor appears in the field. After every
[Shift-Tab]
the cursor moves to the previous
field. Sometimes this is faster than [Tab]
.
[Del]
or [BackSpace]
repeatedly.
[CapsLock]
somewhere along
the way? The system may consider the user name 'hparkh' and
'HPARKH' to be different. This is easy to spot. However, the
system may also consider the passwords 'ahgiesah' and 'AHGIESAH'
to be different. That is much harder, because only asterisks are
shown in the password field.
You can retry the procedure but this time explicitely retyping the information for all three fields, making sure that you did not make any typing errors.
[Esc]
key instead of the [Enter]
key to confirm the dialogue.
The effect of either action resembles a valid login. However, the pupil has not established a connection between the workstation and the the network server; no network logon script was executed and no personal profile was copied.
The difference between a valid logon and a non-logon can be seen by pressing on the [Start] button and observing the menu that opens. The fact that an entry 'Log Off...' exists indicates a non-logon. This is illustrated below.
In case of a valid logon, this entry would include the user name, e.g. 'Log Off Grade3...' rather than the plain 'Log Off...'.
The remedy is as follows.
[Esc]
key.
Another example: someone tripped over a cable, disconnecting the network. As a result, the workstation appears to work but no connection to the network can be established.
Yet another example: someone accidently mixed up the keyboard and the mouse, attaching the mouse to the keyboard connector at the back of the computer and attaching the keyboard to the mouse connector.
All this (and more) may result in a seemingly dead workstation, a black screen, a blue screen or strange error messages, the list goes on and on. When you experience some strange behaviour of a workstation, the following basic troubleshooting tips can be helpful. Please start with the first step.
EMEMPLUM
and EXEMPLUM
.
NOTICE: If you report problems to the ICT coordinator or the local systems administrator, please make sure that you provide as much relevant information as possible. At the very least indicate which computer was causing you problems (the computer number should be written on the computer case with a felt tip pen). It is also very helpful to explain what you were trying to accomplish and also exactly what you have tried in order to resolve the problem yourself (e.g. checking the cables, trying another workstation, etc.). Depending on the school's policy there may be an official 'problem report form' either on paper or on-line that you can use for reporting problems. Ask your ICT coordinator.
The logout procedure works the same for all users, there is no difference between logging off with a teacher account or a pupils account. The procedure documented below is illustrated using the account information of Helen Parkhurst, the teacher of grade 3 (see section 2. The Exemplum Primary School in chapter II. ServerAtSchool User Manual Overview). Her userid is 'hparkh'.
Take the following steps to log off.
[Ctrl-Esc]
key combination to open the
menu, using [CursorUp]
to move the menu cursor to
the item 'Log Off Hparkh' and hitting [Enter]
.
[Start Menu]
key (available
on some keyboards) to open the
menu, using [CursorUp]
to move the menu cursor to
the item 'Log Off Hparkh' and hitting [Enter]
.
[Enter]
key.
[Alt-Y]
key combination.
[Esc]
,
[Alt-N]
or press [No] to cancel the procedure. You
then return to the Desktop and you are not logged off.
Note that (in this case) the name of the user that has has just logged off is retained in the 'User name' field.
NOTICE: If a particular workstation is always or almost always used by the same user, it is very convenient that the user name is retained. This is often the case when a workstation is located inside a classroom and this workstation is used by pupils who login using a 'nest' account. In other cases, e.g. workstations in a special computer classroom, it can be inconvenient to be forced to remove the previous user's name every time you want to login. It depends on the school's policy if the last username is retained or not. Ask your local systems administrator for more information.
Authors: Peter Fokker <peter (at) berestijn.nl> and Dirk Schouten <schoutdi (at) knoware.nl> $Id: login.html,v 1.12 2006/04/04 09:23:23 peter Exp $