Hitachi

JP1 Version 12 JP1/Client Process Automation Configuration and Administration Guide


8.2.6 Windows log on

This item performs log-on to Windows or unlocks the screen. To use this item, you have to set it up.

To use this item, you have to first set up the Windows log-on function and map information regarding the users logging on to Windows (Windows user names and passwords) to virtual users. For details on how to set up, see 2.3.4 Using the Windows log-on function.

Organization of this subsection

(1) List of settings

Name

Required

Format

Can specify inherited information?

Virtual user name

Yes

String (1 to 14 bytes)

No

(2) Settings

Virtual user name

Specify the virtual user name mapped to the name of the Windows user logging on to Windows. Use the cpasetumap command to map the virtual user name. For details on the cpasetumap command, see cpasetumap in 9. Commands.

(3) Return values

Value

Description

-1

Forced termination.

0

The log-on or unlock screen action was successful.

41

The log-on processing timed out.

[Action to take]

Check the state of the communication with the domain server as well as the availability of system resources, and then re-execute the action item.

46

Due to a password error or other mistake in the settings, the log-on action failed.

[Action to take]

Check if the password is correct, if it is valid, and if it has been set in the first place.

47

Another user was logged on.

[Action to take]

Re-execute the action item after the logged-on user logs off.

52

A permission error occurred.

[Action to take]

Check that Local System account is set to the account of the user who starts the job execution service.

76

The virtual user is not registered.

[Action to take]

Register a virtual user.

77

The Windows user does not exist.

[Action to take]

Check if the Windows user mapped with the virtual user exists.

125

A system error occurred.

[Action to take]
  • Check whether the machine was restarted after the setup of the Windows log-on function.

  • Check if any Windows user manually logged on to Windows after a failed attempt to execute the Windows log-on action.

  • Check if a Remote Desktop connection was established during the execution of the Windows log-on action.

  • Check if multiple Windows log-on actions were simultaneously executed.

(4) Example

In the following example, the Windows user name UserA# mapped to the virtual user name logonuserA is used to log on to Windows:

Virtual user name

logonuserA

#

You have to first map the virtual user name logonuserA to a Windows user name by using the cpasetumap command.

(5) Command name that is output to log files

cpaalexec.exe

(6) How the item behaves in an environment used by multiple Windows users

In an environment where multiple Windows users are registered on a single machine, the item behaves as described in the table below depending on the timing of the execution of a Windows log-on action.

Table 8‒7: How the item behaves when a Windows log-on action is executed in an environment used by multiple users

Status of the Windows user logging on to Windows

Status of other users

How the item behaves when a Windows log-on action is executed

Status (return value)

Behavior

Message ID

Log-off

Log-off

Normal end (0)

The user logs on.

--

Log-on

Abnormal end (47)

The user does not log on.

KNAO2804-E

Lock screen

Normal end (0)

The user logs on.

--

Log-on

Log-off

Normal end (0)

The user does not log on.

--

Lock screen

Lock screen

Log-off

Normal end (0)

Lock screen is canceled.

--

Log-on

Abnormal end (47)

Lock screen is not canceled.

KNAO2804-E

Lock screen

Normal end (0)

Lock screen is canceled.

--

Legend:

--: Not applicable

If an error occurs in any of the cases described in the table above, use the standard error output or the product log to check the message corresponding to the applicable message ID, confirm the log-on status of the Windows user, and then re-execute the Windows log-on action.

(7) Log-on behavior

When using this item, keep the following in mind with regard to the Windows log-on behavior: