FTP Windows Server 2008, don't make users login?

Posted on 2011-05-03
Last Modified: 2012-08-13
I'm trying to configure an internal FTP server for a coworker to use for temporary storage.  He doesn't want to have to login at all.  Setting it to Anonymous Authentication still requires you to enter a username and password.  How can I make it not require anything?
Question by:Cerixus
    LVL 9

    Expert Comment

    Could be NTFS permissions. How are the NTFS permissions setup on the folder.

    Here is a decent how to in case you want to retrace your steps.
    LVL 1

    Author Comment

    I'm not sure you understand.  Here is the description of "Anonymous Authentication" from IIS Help:

    "Anonymous authentication is a built-in authentication method that allows any user to access any public content by providing an anonymous user name and password. By default, Anonymous authentication is disabled."

    I want to avoid the bold part.
    LVL 16

    Assisted Solution

    I doubt you can do what you want to do.  The most simple configuration I've seen is where the username is "anonymous" and the password is either blank or whatever you type is is accepted as valid.  If you want to make it easier to use, perhaps a better method would be to use a scriptable ftp client with a command script to log in automatically.

    LVL 1

    Author Comment

    The client is the problem and what is driving the requirement for no username password.  It cannot be changed.
    LVL 9

    Accepted Solution

    AFAIK there is no way around not providing _something_. For instance, in most FTP clients where you have a check box or whatever for "anonymous user". All that does is send a canned user name and password. All Anonymous FTP really means is that no verification is preformed against the creds you supply, but something needs to be supplied.

    However... you can pass a BS username and password in the URL you use to make the connection. That may help you.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
    The recent Microsoft changes on update philosophy for Windows pre-10 and their impact on existing WSUS implementations.
    This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
    This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now