Solved

How to share files over networks, without having an excess of accounts

Posted on 2004-09-09
1
145 Views
Last Modified: 2010-03-18
Network diagram:
http://server5.uploadit.org/files/krupini-net.jpg

Now, I could add user 'Family1' to 'Nigor' computer, and user 'Igor' to 'Family' computer, and give appropriate permissions to all acounts. Then just share the folders. It works.

Now, i am not comfortable with adding accounts to the computers for no reason other than to give them network access. For example, on my computer, 'Nigor', I have one user -- 'Igor'. I login to that acount and use the computer. If I add another account, 'Family1', it will be just sitting there, no one will ever use it on my computer. And if i decide to network more computers -- you get the picture. Every computer will have one account that will actualy be used, and the others are just there for network purposes. Things could get confusing.

Is there anyway, using domain or something, to avoid this?

Noob.
0
Comment
Question by:krupini
1 Comment
 
LVL 7

Accepted Solution

by:
Focusyn earned 300 total points
Comment Utility
Yes, a domain can fix that issue.  IF you call your domain "Bob" and all computers are on domain, add the Family1 user account to the Bob domain.  Then when you create a share on any system, you can add permission for the user "Bob\Family1" which is a domain account, to have read access, and anyone logged in as Family1 on any computer will be able to get any share on any computer across the domain for which you added read permission for Bob\Family1.  You need not add ANY local accounts for the purposes of sharing.  Further more, you can prevent Family1 account from logging in to any particular computer or group of computers, but that account will still be able to access any specified share on those PCs from any computer to which they are granted login access rights.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Downtime reduced, data recovered by utilizing an Experts Exchange Business Account Challenge The United States Marine Corps employs more than 200,000 active-duty Marines with operations in four continents, all requiring complex networking system…
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now