Community technical support mailing list was retired 2010 and replaced with a professional technical support team. For assistance please contact: Pre-sales Technical support via email to sales@march-hare.com.
> I understand that SYSTEM cannot access any network resources. However, when > the process impersonates the client user shouldn't they be able to access > any network resources the client has rights to? > Part of the server operations are done with the SYSTEM token, for example reading the administrative files from the <repo>/CVSROOT folder. BTW, you've read many times already that accessing sandboxes and _worse_ _yet_ repositories through network shares is very discouraged, right? Regards, Flávio