SharePoint - "file corruption" for only a certain user, permissions issue

Posted on 2011-10-19
Last Modified: 2012-05-12
Here's the issue I'm having:

I have a Shartpoint site, containing a document library.  The document library DOES NOT inherit permissions from the main site, on purpose, because there's one person who isn't a member of the main site who needs access to only this document library.  

I have setup permissions accordingly.  The uesr can get to the doc library when given a direct link.  However, when she goes to open any Word file in the doc library, she gets the error message seen in the image.  This happens on any computer she uses.  The file is NOT corrupt, and opens fine otherwise.
"File corruption"
I have found that the only way to make it so she can open the files is by giving her read-access to the root site...but, that's not an acceptable solution.  In the root site, it shows she has "limited" access (access only to specific lists/libraries), and in the doc library itself, she has "Contribute" access.  Even if I give her "Full Control" access to the doc library, it still won't let her look at the documents unless I give her access to the root site.  Why?!?
Question by:mgudites1
    LVL 38

    Expert Comment

    What version of SharePoint?  The limited access is added by default when a lower level list/site has unique permissions.  You shouldn't have to grant them read access to the top level site to enable access to this library.

    Are you by chance using a custom master page on your site?
    LVL 1

    Author Comment

    This is Sharepoint 2007.  Yes, we are using custom master pages.
    LVL 1

    Accepted Solution

    What I ended up doing was creating a custom security level to give this user on the root page, which allowed them access to the root page but not see any data on it.  That fixed this problem.
    LVL 1

    Author Closing Comment

    figured it out on my own

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    Entering a date in Microsoft Access can be tricky. A typo can cause month and day to be shuffled, entering the day only causes an error, as does entering, say, day 31 in June. This article shows how an inputmask supported by code can help the user a…
    These days socially coordinated efforts have turned into a critical requirement for enterprises.
    The viewer will learn how to create two correlated normally distributed random variables in Excel, use a normal distribution to simulate the return on different levels of investment in each of the two funds over a period of ten years, and, create a …
    The viewer will learn how to  create a slide that will launch other presentations in Microsoft PowerPoint. In the finished slide, each item launches a new PowerPoint presentation and when each is finished it automatically comes back to this slide: …

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now