Windows Account for the EFT Server Service

After it is installed, EFT has access to local folders and files. To run EFT as a service with permissions to the network and mapped drives, you must create a Windows account, set Windows NT permissions for EFT, assign the EFT server service to the account, and log EFT on as a service. Security policies should allow user accounts to log in locally.

The EFT server service must have full administrative rights to:

With administrative rights, the service can save all of your settings. If the service does not have administrative rights, you will lose settings and user accounts whenever you restart the EFT server service, and you will need to reset permissions on the computer on which the EFT server service is running.

If EFT is running in HA mode and sharing a network resource, you must run the EFT server service with an account that can access that shared network resource.

NOTE: During upgrade, the name of the server service could be different, depending on the version you upgraded from; therefore, you will lose the connection to the server service Log On account. Refer to Assigning the Service to a Windows User Account to add the "Log on as" account for the EFT Server service.

Refer to Local Security Policy Setting when Using Active Directory Authentication for more information about configuring EFT on an AD network. Consult with your AD network administrator for assistance, if necessary.

After you have installed EFT, created a Windows account for EFT, and assigned permissions to the account, you should edit the service itself so that it will not run as a "System Account" (the default account choice). Running the service as System Account poses the potential hazard of giving users complete access to your system.