IIS FTP Permissions

Posted on 2006-05-16
Last Modified: 2010-03-18
I have a very basic FTP site set up for my company (not in production yet). I need to know if this is possible:

- Give all domain users permissions to read/write to the root and subdirectories of my site from their workstations (internal IP addresses)
- Supply outsiders with temporary usernames/passwords to access the FTP site and download (and occasionally upload) data.  
Question by:tenover
    LVL 12

    Accepted Solution

    You should be able to do this using a mix of permissions. NTFS permissions apply to all types of requests. Web permissions apply only to HTTP requests. See this for further information:
    LVL 2

    Assisted Solution

    Yes, for the outsiders create a local account in your FTP server, and make sure to give the required access to them, for internal users use any domain local gorup and give the access.

    Hope this help
    LVL 12

    Expert Comment

    Thats correct :)  And it should work nicely...

    Author Comment

    Thanks.  I was under the impression that it was a bad idea to do that, because the credentials are passed in clear text, thus allowing a hacker to grab them and login to the machine possibly....
    LVL 12

    Expert Comment

    Well...yes and no. Having an anonymous FTP can be a bad thing if you allow all users to write to it. I have seen many a FTP server get filled with warez this way, its not good. I would consider using an upload script that will allow your users to upload files similar to this, but there are a bunch online, mostly free:

    If you just set the perms for http users to read then they will just be able to download files and not write to the FTP server, which is very secure. I have used the form based upload scripts before and they work great. Here is some more information on Windows FTP setup and configuration:

    hth :)

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Downtime reduced, data recovered by utilizing an Experts Exchange Business Account Challenge The United States Marine Corps employs more than 200,000 active-duty Marines with operations in four continents, all requiring complex networking system…
    Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now