scripts to be executed.
We were filling in our name as the server which processed the login, even
when it was done by a trusted DC.
Thanks to John Janosik <jpjanosi@us.ibm.com> for the fix.
(This used to be commit
0446319a3b8096df385978449ffaa231bc5cfd0c)
return nt_status;
}
+ (*server_info)->login_server = unistr2_tdup(mem_ctx,
+ &(info3->uni_logon_srv));
+
(*server_info)->ptok = token;
SAFE_FREE(lgroupSIDs);
DATA_BLOB user_session_key;
DATA_BLOB lm_session_key;
+
+ char *login_server; /* which server authorized the login? */
uint32 sam_fill_level; /* How far is this structure filled? */
return NT_STATUS_UNSUCCESSFUL;
}
- pstrcpy(my_name, global_myname());
-
+
+ if(server_info->login_server) {
+ pstrcpy(my_name, server_info->login_server);
+ } else {
+ pstrcpy(my_name, global_myname());
+ }
+
if (!NT_STATUS_IS_OK(status
= nt_token_to_group_list(p->mem_ctx,
&domain_sid,