Forum Discussion
HiddenTiger
Feb 21, 2025Copper Contributor
Write to workgroup fileserver from AzureAD joined device.
Hi,
We currently have a situation where we are trying to install a program locally, but we want some of the data files (master data for projects, company settings for the most part) to be stored on a fileserver. The installer allows for this change to set UNC path to the share manually, and in our case recommends doing that.
The problem we are facing occurs when trying to go on with the installation, the problem reports back that write-protection is enabled.
I have the share mapped as a nettwork station, and can create folders/files through explorer. But I think the issue here is that the share mapped using the "Connect with different credential" option, which is required since the share is on a server in a workgroup and the client I'm using is joined to AzureAD.
And when i run the installer for the program it is ofcourse ran with my azure user (local administrator), and I guess it tries to write to the UNC path with that user ofcourse.
Is there any way i can let the program write to the share without it being to much of a security risk?
The same program also has a nettwork license installed on a different workgroup server. I also had to add local users to that server and do some DCOM permission tweaking for that to work. For the license part i can authenticate with the local server user, but thats not an option when trying to install with UNC path for the file/folder structure.
- micheleariisSteel Contributor
Hi, the issue is that the installer runs with your AzureAD account (local administrator), while the share requires different credentials for writing; mapping the share with "Connect with different credentials" works in Explorer, but the installer still uses your AzureAD account.
You can resolve this by running the installer with the authorized account using “runas”, mapping the share via command line with “net use” and specifying the correct credentials, or temporarily adjusting the share’s permissions (always balancing operational needs with security)