I really hope that we can get some resolution regarding AD integrated security into Visual Cron this time around.
To be clear, the first requirement is that a user be authenticated using AD instead of the internal VC username/password. The reason is two-fold; to remove a security audit finding whereby the VC password does not adhere to company policies i.e. password length, aging etc. Secondly only users authenticated onto our company LAN can access a VC session.
As I suggested before, that by following a strategy of providing an option to map a Windows User to an internal VC User limits the impact of changes to VC and users not needing this functionality. VC already holds the Windows User name in the connection properties of a session. So if an incoming login request matches a mapped name VC simply bypasses the normal username/password login procedure. All security with-in VC is still controlled by the internal VC username. This methodology is employed by systems which have their own security mechanisms, like Cognos & MS Visual SourceSafe which need to integrate into external authentication systems.
Secondly the area that really does need attention and a total re-write is the simplistic way VC user rights are controlled. Until user rights can be assigned to individual jobs, implementing VC across an enterprise remains problematic.