Users logging in remotely through a VPN connection, they need to be able to run the Desktop Authority logon script. When remote users login to their machines (using cached credentials) and establish a VPN connection to the network, DA will not run. Desktop Authority can be configured to fire an event when a network connection (VPN) is established.
With the implementation of the following registry keys, the DA Client Service uses Network Location Awareness (NLA) to detect when a new network connection becomes available. Once the new connection is detected, DA will be notified and can then determine whether it will execute for the user.
VPN Client configuration settings are made on the client machine to the following registry:
Enable or disable the VPN client feature in Desktop Authority
EnableNLA (REG_DWORD) = 0 (Disable – Default), 1 or 2
EnableNLA = 1 (ON)
Enables or disables NLA for UBM and CBM.
EnableNLA = 2 (ON + Network disconnection detection). Only applies to DA 10.1+ and 10.0 hotfix after 448
Enables NLA as above and includes network disconnection and re-connection detection. The use case for this is when a user disconnects from the direct connect LAN and then goes to wireless. Desktop Authority will want to re-map printers, drives, etc.
NLAAltScript (REG_SZ) = Login.bat or Login,Login.bat,Slogic,Slogic.bat.
Desktop Authority will execute when a new network connection is detected. If the connection is dropped and then re-established within the amount of time state in the registry, Desktop Authority will not execute again.
NLAperiod (REG_DWORD) = 0 (Disabled), 1-86400 (in seconds, default is 1800 seconds/30 minutes)
When a new connection is detected, by default a Refresh even will be triggered, if you want to change that to Logon or Logoff, set the following registry
NLAUBMEvent (REG_SZ) = Logon, Logoff or Refresh (Default)
By default, when Desktop Authority is executed, the Slogic.bat file is launched from the Netlogon share. You can instruct Desktop Authority to use a different location for Slogic.bat by putting in this registry.
NLAUBMLocation (REG_SZ) = path of the logon script (Default - %logonserver%\Netlogon)
For troubleshooting you can instruct Desktop Authority not to hide the command window when executing Desktop Authority.
NLAShowWindow (REG_DWORD) = 0 (Disable – Default) or 1 (Enable)