On 06/26/2011 06:21 AM, Karmi Simonov wrote: > Guys, Any ideas? The situation you present is curious and not something we can replicate. If you can capture a full network log of the sequence you outline below (Before, after, after submitting credentials), we might be able to debug it. Thomas