Run as different user and elevate
Within Windows Explorer, I can right click on an executable file and pick 'Run as administrator' which will launch the selected process with elevated privileges or I can shift-right click on the executable file and click 'Run as different user', specify the username and password which will launch the process with standard privileges using the specified user context.
How do I run as a different user AND run in an elevated context? A perfect example of this would be opening an elevated command prompt using a different user context that the currently logged in user.
windows uac
add a comment |
Within Windows Explorer, I can right click on an executable file and pick 'Run as administrator' which will launch the selected process with elevated privileges or I can shift-right click on the executable file and click 'Run as different user', specify the username and password which will launch the process with standard privileges using the specified user context.
How do I run as a different user AND run in an elevated context? A perfect example of this would be opening an elevated command prompt using a different user context that the currently logged in user.
windows uac
I think powershell thestart-process
command might be able to do this.
– jiggunjer
Jan 17 '16 at 15:02
add a comment |
Within Windows Explorer, I can right click on an executable file and pick 'Run as administrator' which will launch the selected process with elevated privileges or I can shift-right click on the executable file and click 'Run as different user', specify the username and password which will launch the process with standard privileges using the specified user context.
How do I run as a different user AND run in an elevated context? A perfect example of this would be opening an elevated command prompt using a different user context that the currently logged in user.
windows uac
Within Windows Explorer, I can right click on an executable file and pick 'Run as administrator' which will launch the selected process with elevated privileges or I can shift-right click on the executable file and click 'Run as different user', specify the username and password which will launch the process with standard privileges using the specified user context.
How do I run as a different user AND run in an elevated context? A perfect example of this would be opening an elevated command prompt using a different user context that the currently logged in user.
windows uac
windows uac
asked Oct 18 '13 at 20:08
ArtArt
1,13211022
1,13211022
I think powershell thestart-process
command might be able to do this.
– jiggunjer
Jan 17 '16 at 15:02
add a comment |
I think powershell thestart-process
command might be able to do this.
– jiggunjer
Jan 17 '16 at 15:02
I think powershell the
start-process
command might be able to do this.– jiggunjer
Jan 17 '16 at 15:02
I think powershell the
start-process
command might be able to do this.– jiggunjer
Jan 17 '16 at 15:02
add a comment |
5 Answers
5
active
oldest
votes
I don't think such an option exists.
As a work around you could start the command line as an admin and execute the following command to run the command line with admin privileges as the other user.
runas /netonly /user:YourUser cmd.exe
5
Or you can right click the executable, then select properties>compatability and then select Privilege Level and check Run this program as an administrator. Then shift right click the executable and run as a different user.
– JamesTheDev
Oct 18 '13 at 21:02
@NewProgrammerJames Nice, thanks for the input :)
– Yass
Oct 18 '13 at 22:22
@NewProgrammerJames This trick doesn't work with CMD directly on W2008R2 and above, but tweaking a custom app should be possible.
– Vesper
Jul 2 '15 at 7:52
This will work even if the end user isn't in the admin group?
– jiggunjer
Jan 17 '16 at 14:56
@jiggunjer No, as far as I know.
– Yass
Jan 17 '16 at 14:57
add a comment |
Yes, psexec absolutely does this.
The following example works cleanly on Windows 8.1; run the command prompt as Administrator, then:
// -i makes the app interactive
// -h elevates the execution context
// Omitting the password forces a secure prompt
psexec -u DOMAINuser -i -h "C:Program Files (x86)Microsoft Visual Studio 14.0Common7IDEdevenv.exe"
From Mike: This works for Windows 10!
– fixer1234
Dec 24 '15 at 9:39
add a comment |
You can do it through PowerShell:
Start-Process powershell -Credential domaindifferentUserName -ArgumentList '-noprofile -command &{Start-Process "TheApp.exe" -verb runas}'
add a comment |
I notice this is a very old question, but the given answers are not ideal and it's already been necroed. All the existing answers require typing archaic commands and knowing the exact path to your executable. An ideal option would make this possible using the same process you already use for privilege escalation.
If you have a non-Home edition of Windows (Vista thru 10) you can use the Security Policy Manager to make it prompt you to give your password whenever elevation occurs. It also gives you the option to select a completely different user and enter their password... which will cause the elevated process to run as them.
Simply open the start menu and type secpol.msc
and hit enter to launch it (if it's available). You're looking for Local Policies
> Security Options
> User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
> Prompt for credentials
. Vista has a similar option that doesn't mention "Admin Approval Mode" but it does the same thing.
I think this is a much more natural option than the other's offered here and is rather reminiscent of gksudo on *nix. But if your edition of Windows doesn't include secpol.msc you will have to do some registry hackery to enable it.
I did this and it doesn't work. And it always asks for my fingerprint instead although I don't configure my fingerprint auth.
– iroel
May 6 '18 at 3:02
@iroel That sounds distinct like there is a configuration problem with your windows' authentication subsystems. You should consider searching SU for a solution to that problem and, if you find nothing, consider posting it as a question. All my systems are set up this way and none of them ask for a thumbprint. Depending on the account I'm authenticating as they ask for either a password or a pin number.
– Cliff Armstrong
May 7 '18 at 15:48
I use fingerprint for authentication. It does happens. 2 solutions that are applicable: make the user having administrative privilege (but it doesn’t make sense in this case), create another user and set the fingerprint (use finger that’s not registered for certain user) and use that finger when asked for elevated privilege. I use the last solution in this case. At least it works for me.
– iroel
Jun 5 '18 at 16:09
If you're being prompted for a fingerprint then either you have set up the user you are trying to log into to require a fingerprint or something is wrong with your installation of windows. Full stop. I use this setup on three different computers and none of them ask for fingerprints. I've set this up on dozens of computers for clients. Windows will prompt for a pin# when logging into a user with a pin# configured and a password for all other users. It uses whatever authentication method you have configured for that user.
– Cliff Armstrong
Jun 18 '18 at 20:55
add a comment |
I found that if I log on as the Run As account you can set the "run this program as administrator" flag on the properties / compatibility page. Then log on the secondary account and perform the shift click run as will open it as administrator.
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "3"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f661979%2frun-as-different-user-and-elevate%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
5 Answers
5
active
oldest
votes
5 Answers
5
active
oldest
votes
active
oldest
votes
active
oldest
votes
I don't think such an option exists.
As a work around you could start the command line as an admin and execute the following command to run the command line with admin privileges as the other user.
runas /netonly /user:YourUser cmd.exe
5
Or you can right click the executable, then select properties>compatability and then select Privilege Level and check Run this program as an administrator. Then shift right click the executable and run as a different user.
– JamesTheDev
Oct 18 '13 at 21:02
@NewProgrammerJames Nice, thanks for the input :)
– Yass
Oct 18 '13 at 22:22
@NewProgrammerJames This trick doesn't work with CMD directly on W2008R2 and above, but tweaking a custom app should be possible.
– Vesper
Jul 2 '15 at 7:52
This will work even if the end user isn't in the admin group?
– jiggunjer
Jan 17 '16 at 14:56
@jiggunjer No, as far as I know.
– Yass
Jan 17 '16 at 14:57
add a comment |
I don't think such an option exists.
As a work around you could start the command line as an admin and execute the following command to run the command line with admin privileges as the other user.
runas /netonly /user:YourUser cmd.exe
5
Or you can right click the executable, then select properties>compatability and then select Privilege Level and check Run this program as an administrator. Then shift right click the executable and run as a different user.
– JamesTheDev
Oct 18 '13 at 21:02
@NewProgrammerJames Nice, thanks for the input :)
– Yass
Oct 18 '13 at 22:22
@NewProgrammerJames This trick doesn't work with CMD directly on W2008R2 and above, but tweaking a custom app should be possible.
– Vesper
Jul 2 '15 at 7:52
This will work even if the end user isn't in the admin group?
– jiggunjer
Jan 17 '16 at 14:56
@jiggunjer No, as far as I know.
– Yass
Jan 17 '16 at 14:57
add a comment |
I don't think such an option exists.
As a work around you could start the command line as an admin and execute the following command to run the command line with admin privileges as the other user.
runas /netonly /user:YourUser cmd.exe
I don't think such an option exists.
As a work around you could start the command line as an admin and execute the following command to run the command line with admin privileges as the other user.
runas /netonly /user:YourUser cmd.exe
answered Oct 18 '13 at 20:22
YassYass
3,0861013
3,0861013
5
Or you can right click the executable, then select properties>compatability and then select Privilege Level and check Run this program as an administrator. Then shift right click the executable and run as a different user.
– JamesTheDev
Oct 18 '13 at 21:02
@NewProgrammerJames Nice, thanks for the input :)
– Yass
Oct 18 '13 at 22:22
@NewProgrammerJames This trick doesn't work with CMD directly on W2008R2 and above, but tweaking a custom app should be possible.
– Vesper
Jul 2 '15 at 7:52
This will work even if the end user isn't in the admin group?
– jiggunjer
Jan 17 '16 at 14:56
@jiggunjer No, as far as I know.
– Yass
Jan 17 '16 at 14:57
add a comment |
5
Or you can right click the executable, then select properties>compatability and then select Privilege Level and check Run this program as an administrator. Then shift right click the executable and run as a different user.
– JamesTheDev
Oct 18 '13 at 21:02
@NewProgrammerJames Nice, thanks for the input :)
– Yass
Oct 18 '13 at 22:22
@NewProgrammerJames This trick doesn't work with CMD directly on W2008R2 and above, but tweaking a custom app should be possible.
– Vesper
Jul 2 '15 at 7:52
This will work even if the end user isn't in the admin group?
– jiggunjer
Jan 17 '16 at 14:56
@jiggunjer No, as far as I know.
– Yass
Jan 17 '16 at 14:57
5
5
Or you can right click the executable, then select properties>compatability and then select Privilege Level and check Run this program as an administrator. Then shift right click the executable and run as a different user.
– JamesTheDev
Oct 18 '13 at 21:02
Or you can right click the executable, then select properties>compatability and then select Privilege Level and check Run this program as an administrator. Then shift right click the executable and run as a different user.
– JamesTheDev
Oct 18 '13 at 21:02
@NewProgrammerJames Nice, thanks for the input :)
– Yass
Oct 18 '13 at 22:22
@NewProgrammerJames Nice, thanks for the input :)
– Yass
Oct 18 '13 at 22:22
@NewProgrammerJames This trick doesn't work with CMD directly on W2008R2 and above, but tweaking a custom app should be possible.
– Vesper
Jul 2 '15 at 7:52
@NewProgrammerJames This trick doesn't work with CMD directly on W2008R2 and above, but tweaking a custom app should be possible.
– Vesper
Jul 2 '15 at 7:52
This will work even if the end user isn't in the admin group?
– jiggunjer
Jan 17 '16 at 14:56
This will work even if the end user isn't in the admin group?
– jiggunjer
Jan 17 '16 at 14:56
@jiggunjer No, as far as I know.
– Yass
Jan 17 '16 at 14:57
@jiggunjer No, as far as I know.
– Yass
Jan 17 '16 at 14:57
add a comment |
Yes, psexec absolutely does this.
The following example works cleanly on Windows 8.1; run the command prompt as Administrator, then:
// -i makes the app interactive
// -h elevates the execution context
// Omitting the password forces a secure prompt
psexec -u DOMAINuser -i -h "C:Program Files (x86)Microsoft Visual Studio 14.0Common7IDEdevenv.exe"
From Mike: This works for Windows 10!
– fixer1234
Dec 24 '15 at 9:39
add a comment |
Yes, psexec absolutely does this.
The following example works cleanly on Windows 8.1; run the command prompt as Administrator, then:
// -i makes the app interactive
// -h elevates the execution context
// Omitting the password forces a secure prompt
psexec -u DOMAINuser -i -h "C:Program Files (x86)Microsoft Visual Studio 14.0Common7IDEdevenv.exe"
From Mike: This works for Windows 10!
– fixer1234
Dec 24 '15 at 9:39
add a comment |
Yes, psexec absolutely does this.
The following example works cleanly on Windows 8.1; run the command prompt as Administrator, then:
// -i makes the app interactive
// -h elevates the execution context
// Omitting the password forces a secure prompt
psexec -u DOMAINuser -i -h "C:Program Files (x86)Microsoft Visual Studio 14.0Common7IDEdevenv.exe"
Yes, psexec absolutely does this.
The following example works cleanly on Windows 8.1; run the command prompt as Administrator, then:
// -i makes the app interactive
// -h elevates the execution context
// Omitting the password forces a secure prompt
psexec -u DOMAINuser -i -h "C:Program Files (x86)Microsoft Visual Studio 14.0Common7IDEdevenv.exe"
answered Dec 7 '15 at 22:29
Paul SmithPaul Smith
236136
236136
From Mike: This works for Windows 10!
– fixer1234
Dec 24 '15 at 9:39
add a comment |
From Mike: This works for Windows 10!
– fixer1234
Dec 24 '15 at 9:39
From Mike: This works for Windows 10!
– fixer1234
Dec 24 '15 at 9:39
From Mike: This works for Windows 10!
– fixer1234
Dec 24 '15 at 9:39
add a comment |
You can do it through PowerShell:
Start-Process powershell -Credential domaindifferentUserName -ArgumentList '-noprofile -command &{Start-Process "TheApp.exe" -verb runas}'
add a comment |
You can do it through PowerShell:
Start-Process powershell -Credential domaindifferentUserName -ArgumentList '-noprofile -command &{Start-Process "TheApp.exe" -verb runas}'
add a comment |
You can do it through PowerShell:
Start-Process powershell -Credential domaindifferentUserName -ArgumentList '-noprofile -command &{Start-Process "TheApp.exe" -verb runas}'
You can do it through PowerShell:
Start-Process powershell -Credential domaindifferentUserName -ArgumentList '-noprofile -command &{Start-Process "TheApp.exe" -verb runas}'
edited Jul 13 '17 at 2:04
Pimp Juice IT
24.2k113974
24.2k113974
answered Jul 12 '17 at 21:46
Darío LeónDarío León
5111
5111
add a comment |
add a comment |
I notice this is a very old question, but the given answers are not ideal and it's already been necroed. All the existing answers require typing archaic commands and knowing the exact path to your executable. An ideal option would make this possible using the same process you already use for privilege escalation.
If you have a non-Home edition of Windows (Vista thru 10) you can use the Security Policy Manager to make it prompt you to give your password whenever elevation occurs. It also gives you the option to select a completely different user and enter their password... which will cause the elevated process to run as them.
Simply open the start menu and type secpol.msc
and hit enter to launch it (if it's available). You're looking for Local Policies
> Security Options
> User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
> Prompt for credentials
. Vista has a similar option that doesn't mention "Admin Approval Mode" but it does the same thing.
I think this is a much more natural option than the other's offered here and is rather reminiscent of gksudo on *nix. But if your edition of Windows doesn't include secpol.msc you will have to do some registry hackery to enable it.
I did this and it doesn't work. And it always asks for my fingerprint instead although I don't configure my fingerprint auth.
– iroel
May 6 '18 at 3:02
@iroel That sounds distinct like there is a configuration problem with your windows' authentication subsystems. You should consider searching SU for a solution to that problem and, if you find nothing, consider posting it as a question. All my systems are set up this way and none of them ask for a thumbprint. Depending on the account I'm authenticating as they ask for either a password or a pin number.
– Cliff Armstrong
May 7 '18 at 15:48
I use fingerprint for authentication. It does happens. 2 solutions that are applicable: make the user having administrative privilege (but it doesn’t make sense in this case), create another user and set the fingerprint (use finger that’s not registered for certain user) and use that finger when asked for elevated privilege. I use the last solution in this case. At least it works for me.
– iroel
Jun 5 '18 at 16:09
If you're being prompted for a fingerprint then either you have set up the user you are trying to log into to require a fingerprint or something is wrong with your installation of windows. Full stop. I use this setup on three different computers and none of them ask for fingerprints. I've set this up on dozens of computers for clients. Windows will prompt for a pin# when logging into a user with a pin# configured and a password for all other users. It uses whatever authentication method you have configured for that user.
– Cliff Armstrong
Jun 18 '18 at 20:55
add a comment |
I notice this is a very old question, but the given answers are not ideal and it's already been necroed. All the existing answers require typing archaic commands and knowing the exact path to your executable. An ideal option would make this possible using the same process you already use for privilege escalation.
If you have a non-Home edition of Windows (Vista thru 10) you can use the Security Policy Manager to make it prompt you to give your password whenever elevation occurs. It also gives you the option to select a completely different user and enter their password... which will cause the elevated process to run as them.
Simply open the start menu and type secpol.msc
and hit enter to launch it (if it's available). You're looking for Local Policies
> Security Options
> User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
> Prompt for credentials
. Vista has a similar option that doesn't mention "Admin Approval Mode" but it does the same thing.
I think this is a much more natural option than the other's offered here and is rather reminiscent of gksudo on *nix. But if your edition of Windows doesn't include secpol.msc you will have to do some registry hackery to enable it.
I did this and it doesn't work. And it always asks for my fingerprint instead although I don't configure my fingerprint auth.
– iroel
May 6 '18 at 3:02
@iroel That sounds distinct like there is a configuration problem with your windows' authentication subsystems. You should consider searching SU for a solution to that problem and, if you find nothing, consider posting it as a question. All my systems are set up this way and none of them ask for a thumbprint. Depending on the account I'm authenticating as they ask for either a password or a pin number.
– Cliff Armstrong
May 7 '18 at 15:48
I use fingerprint for authentication. It does happens. 2 solutions that are applicable: make the user having administrative privilege (but it doesn’t make sense in this case), create another user and set the fingerprint (use finger that’s not registered for certain user) and use that finger when asked for elevated privilege. I use the last solution in this case. At least it works for me.
– iroel
Jun 5 '18 at 16:09
If you're being prompted for a fingerprint then either you have set up the user you are trying to log into to require a fingerprint or something is wrong with your installation of windows. Full stop. I use this setup on three different computers and none of them ask for fingerprints. I've set this up on dozens of computers for clients. Windows will prompt for a pin# when logging into a user with a pin# configured and a password for all other users. It uses whatever authentication method you have configured for that user.
– Cliff Armstrong
Jun 18 '18 at 20:55
add a comment |
I notice this is a very old question, but the given answers are not ideal and it's already been necroed. All the existing answers require typing archaic commands and knowing the exact path to your executable. An ideal option would make this possible using the same process you already use for privilege escalation.
If you have a non-Home edition of Windows (Vista thru 10) you can use the Security Policy Manager to make it prompt you to give your password whenever elevation occurs. It also gives you the option to select a completely different user and enter their password... which will cause the elevated process to run as them.
Simply open the start menu and type secpol.msc
and hit enter to launch it (if it's available). You're looking for Local Policies
> Security Options
> User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
> Prompt for credentials
. Vista has a similar option that doesn't mention "Admin Approval Mode" but it does the same thing.
I think this is a much more natural option than the other's offered here and is rather reminiscent of gksudo on *nix. But if your edition of Windows doesn't include secpol.msc you will have to do some registry hackery to enable it.
I notice this is a very old question, but the given answers are not ideal and it's already been necroed. All the existing answers require typing archaic commands and knowing the exact path to your executable. An ideal option would make this possible using the same process you already use for privilege escalation.
If you have a non-Home edition of Windows (Vista thru 10) you can use the Security Policy Manager to make it prompt you to give your password whenever elevation occurs. It also gives you the option to select a completely different user and enter their password... which will cause the elevated process to run as them.
Simply open the start menu and type secpol.msc
and hit enter to launch it (if it's available). You're looking for Local Policies
> Security Options
> User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
> Prompt for credentials
. Vista has a similar option that doesn't mention "Admin Approval Mode" but it does the same thing.
I think this is a much more natural option than the other's offered here and is rather reminiscent of gksudo on *nix. But if your edition of Windows doesn't include secpol.msc you will have to do some registry hackery to enable it.
answered Jul 12 '17 at 22:02
Cliff ArmstrongCliff Armstrong
1,224112
1,224112
I did this and it doesn't work. And it always asks for my fingerprint instead although I don't configure my fingerprint auth.
– iroel
May 6 '18 at 3:02
@iroel That sounds distinct like there is a configuration problem with your windows' authentication subsystems. You should consider searching SU for a solution to that problem and, if you find nothing, consider posting it as a question. All my systems are set up this way and none of them ask for a thumbprint. Depending on the account I'm authenticating as they ask for either a password or a pin number.
– Cliff Armstrong
May 7 '18 at 15:48
I use fingerprint for authentication. It does happens. 2 solutions that are applicable: make the user having administrative privilege (but it doesn’t make sense in this case), create another user and set the fingerprint (use finger that’s not registered for certain user) and use that finger when asked for elevated privilege. I use the last solution in this case. At least it works for me.
– iroel
Jun 5 '18 at 16:09
If you're being prompted for a fingerprint then either you have set up the user you are trying to log into to require a fingerprint or something is wrong with your installation of windows. Full stop. I use this setup on three different computers and none of them ask for fingerprints. I've set this up on dozens of computers for clients. Windows will prompt for a pin# when logging into a user with a pin# configured and a password for all other users. It uses whatever authentication method you have configured for that user.
– Cliff Armstrong
Jun 18 '18 at 20:55
add a comment |
I did this and it doesn't work. And it always asks for my fingerprint instead although I don't configure my fingerprint auth.
– iroel
May 6 '18 at 3:02
@iroel That sounds distinct like there is a configuration problem with your windows' authentication subsystems. You should consider searching SU for a solution to that problem and, if you find nothing, consider posting it as a question. All my systems are set up this way and none of them ask for a thumbprint. Depending on the account I'm authenticating as they ask for either a password or a pin number.
– Cliff Armstrong
May 7 '18 at 15:48
I use fingerprint for authentication. It does happens. 2 solutions that are applicable: make the user having administrative privilege (but it doesn’t make sense in this case), create another user and set the fingerprint (use finger that’s not registered for certain user) and use that finger when asked for elevated privilege. I use the last solution in this case. At least it works for me.
– iroel
Jun 5 '18 at 16:09
If you're being prompted for a fingerprint then either you have set up the user you are trying to log into to require a fingerprint or something is wrong with your installation of windows. Full stop. I use this setup on three different computers and none of them ask for fingerprints. I've set this up on dozens of computers for clients. Windows will prompt for a pin# when logging into a user with a pin# configured and a password for all other users. It uses whatever authentication method you have configured for that user.
– Cliff Armstrong
Jun 18 '18 at 20:55
I did this and it doesn't work. And it always asks for my fingerprint instead although I don't configure my fingerprint auth.
– iroel
May 6 '18 at 3:02
I did this and it doesn't work. And it always asks for my fingerprint instead although I don't configure my fingerprint auth.
– iroel
May 6 '18 at 3:02
@iroel That sounds distinct like there is a configuration problem with your windows' authentication subsystems. You should consider searching SU for a solution to that problem and, if you find nothing, consider posting it as a question. All my systems are set up this way and none of them ask for a thumbprint. Depending on the account I'm authenticating as they ask for either a password or a pin number.
– Cliff Armstrong
May 7 '18 at 15:48
@iroel That sounds distinct like there is a configuration problem with your windows' authentication subsystems. You should consider searching SU for a solution to that problem and, if you find nothing, consider posting it as a question. All my systems are set up this way and none of them ask for a thumbprint. Depending on the account I'm authenticating as they ask for either a password or a pin number.
– Cliff Armstrong
May 7 '18 at 15:48
I use fingerprint for authentication. It does happens. 2 solutions that are applicable: make the user having administrative privilege (but it doesn’t make sense in this case), create another user and set the fingerprint (use finger that’s not registered for certain user) and use that finger when asked for elevated privilege. I use the last solution in this case. At least it works for me.
– iroel
Jun 5 '18 at 16:09
I use fingerprint for authentication. It does happens. 2 solutions that are applicable: make the user having administrative privilege (but it doesn’t make sense in this case), create another user and set the fingerprint (use finger that’s not registered for certain user) and use that finger when asked for elevated privilege. I use the last solution in this case. At least it works for me.
– iroel
Jun 5 '18 at 16:09
If you're being prompted for a fingerprint then either you have set up the user you are trying to log into to require a fingerprint or something is wrong with your installation of windows. Full stop. I use this setup on three different computers and none of them ask for fingerprints. I've set this up on dozens of computers for clients. Windows will prompt for a pin# when logging into a user with a pin# configured and a password for all other users. It uses whatever authentication method you have configured for that user.
– Cliff Armstrong
Jun 18 '18 at 20:55
If you're being prompted for a fingerprint then either you have set up the user you are trying to log into to require a fingerprint or something is wrong with your installation of windows. Full stop. I use this setup on three different computers and none of them ask for fingerprints. I've set this up on dozens of computers for clients. Windows will prompt for a pin# when logging into a user with a pin# configured and a password for all other users. It uses whatever authentication method you have configured for that user.
– Cliff Armstrong
Jun 18 '18 at 20:55
add a comment |
I found that if I log on as the Run As account you can set the "run this program as administrator" flag on the properties / compatibility page. Then log on the secondary account and perform the shift click run as will open it as administrator.
add a comment |
I found that if I log on as the Run As account you can set the "run this program as administrator" flag on the properties / compatibility page. Then log on the secondary account and perform the shift click run as will open it as administrator.
add a comment |
I found that if I log on as the Run As account you can set the "run this program as administrator" flag on the properties / compatibility page. Then log on the secondary account and perform the shift click run as will open it as administrator.
I found that if I log on as the Run As account you can set the "run this program as administrator" flag on the properties / compatibility page. Then log on the secondary account and perform the shift click run as will open it as administrator.
answered Jan 4 at 17:31
Alan ThompsonAlan Thompson
1
1
add a comment |
add a comment |
Thanks for contributing an answer to Super User!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f661979%2frun-as-different-user-and-elevate%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
I think powershell the
start-process
command might be able to do this.– jiggunjer
Jan 17 '16 at 15:02