delorie.com/archives/browse.cgi | search |
X-Recipient: | archive-cygwin AT delorie DOT com |
X-Spam-Check-By: | sourceware.org |
Date: | Sat, 4 Sep 2010 20:42:00 +0200 |
From: | Corinna Vinschen <corinna-cygwin AT cygwin DOT com> |
To: | cygwin AT cygwin DOT com |
Subject: | Re: Network drives & ssh access |
Message-ID: | <20100904184200.GJ16534@calimero.vinschen.de> |
Reply-To: | cygwin AT cygwin DOT com |
Mail-Followup-To: | cygwin AT cygwin DOT com |
References: | <13D45C6CDAB7C51EF7CDC050@[192.168.1.2]> <4C732336 DOT 6020806 AT cygwin DOT com> <1C018B15ED56529CD242DC44@[192.168.1.2]> <DD4E52CFB8D58B3E571E516B@[192.168.1.2]> <4C73FF2D DOT 2030903 AT cygwin DOT com> <D655A54A1491442CF048CBC6@[192.168.1.2]> <B3C257C4B47939D918F52E72@[192.168.1.2]> <B567757BCFA59CCF0569B498@[192.168.1.2]> <20100904093040 DOT GG16534 AT calimero DOT vinschen DOT de> <8974F9F78FA00EAED4D2C1AE@[192.168.1.2]> |
MIME-Version: | 1.0 |
In-Reply-To: | <8974F9F78FA00EAED4D2C1AE@[192.168.1.2]> |
User-Agent: | Mutt/1.5.20 (2009-06-14) |
Mailing-List: | contact cygwin-help AT cygwin DOT com; run by ezmlm |
List-Id: | <cygwin.cygwin.com> |
List-Unsubscribe: | <mailto:cygwin-unsubscribe-archive-cygwin=delorie DOT com AT cygwin DOT com> |
List-Subscribe: | <mailto:cygwin-subscribe AT cygwin DOT com> |
List-Archive: | <http://sourceware.org/ml/cygwin/> |
List-Post: | <mailto:cygwin AT cygwin DOT com> |
List-Help: | <mailto:cygwin-help AT cygwin DOT com>, <http://sourceware.org/ml/#faqs> |
Sender: | cygwin-owner AT cygwin DOT com |
Mail-Followup-To: | cygwin AT cygwin DOT com |
Delivered-To: | mailing list cygwin AT cygwin DOT com |
On Sep 4 11:12, Quanah Gibson-Mount wrote: > --On Saturday, September 04, 2010 11:30 AM +0200 Corinna Vinschen > <corinna-cygwin AT cygwin DOT com> wrote: > > >The login via ssh is another session. The Windows mounts are only > >stored on a per-session base. > > I thought the point of using passwd -R is so that when you log in to > a new session, the drive gets automatically mounted... No, the idea is to use password authentication under the hood and thus get a valid user token with all permissions and credentials the user has when logging in on the console. It does not mean that all automatisms of the GUI are available, too. Corinna -- Corinna Vinschen Please, send mails regarding Cygwin to Cygwin Project Co-Leader cygwin AT cygwin DOT com Red Hat -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |