?
Solved

Folder security

Posted on 2013-01-24
2
Medium Priority
?
187 Views
Last Modified: 2013-02-01
I created several url links(pointers to a file in a network directory) but Id like to distribute these files to individual folders so essentially when a user clicks the link it takes user to the folder where the file can be viewed or downloaded.

Questions:

1. what folder security can be implemented so that user can only see their own stuff in that directory?
2. Is this the best way to handle file distribution? or other way to do it?

3. what other ideas can be taken?
0
Comment
Question by:zachvaldez
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 10

Accepted Solution

by:
ddiazp earned 960 total points
ID: 38817120
I think what you need to do (best way to do what you're asking for) is to assign each user their own folder. Put the files for each person on their own folder and tune that folder to only allow that person to read that folder (standard home folder setup).


There's no folder security or folder option that only shows items that are owned. The most you can do in that regard is show all items but only give read/write/execute access to the ones they own. This would have to be done on a file by file basis so it's more cumbersome
0
 

Author Closing Comment

by:zachvaldez
ID: 38843854
It is OK to take this answer to start with. thanks
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question