Solved

How to give a temporary remote user limited access to network files

Posted on 2014-01-14
13
377 Views
Last Modified: 2014-01-16
Environment is windows 2003 domain.

We have need for a temporary outside user to have access to only one set of our network folders. I have created a user ID for this user.

How can I prevent them from having access to anything else including areas that can normally be accessed by "Authenticated Users".

Or perhaps, how can I remove this user from "Authenticated Users"?
0
Comment
Question by:TMITECHS
  • 5
  • 4
  • 3
  • +1
13 Comments
 
LVL 19

Assisted Solution

by:Patricksr1972
Patricksr1972 earned 250 total points
ID: 39780240
Hi

Authenticated users are users who have authenticated to the domain controller.

This outside user does work on premises? In that case you do not create a domain users account on the DC but a local user account on the file server where the folder resides.

Create a security group on that box called 'outside users' and make the new user a member for that group.
Once done delete all memberships beside the outside users and give this group appropiate rights on th folder you want to. This pretty covers your issue i suppose.
0
 
LVL 3

Assisted Solution

by:fredvr666
fredvr666 earned 50 total points
ID: 39780242
You cannot remove the user from Authenticated Users it's a builtin group.
The only way is joning the user to a group and then deny the rights on a directory or file to that group
0
 

Author Comment

by:TMITECHS
ID: 39780282
To: Patricksr1972

This sounds good but will that user now be able to RDC into our network to access the files they need?

To: fredvr666

Thanks I needed that confirmation that I could not remove a user from Auth Users.
But with the method you describe I need to deny all shares at high level and then grant access at one low level folder. Does this seem right? I don' want to risk overwriting my vast array of permissions.
0
Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

 
LVL 5

Assisted Solution

by:Jullez
Jullez earned 200 total points
ID: 39780302
How is the user connecting to your network, VPN or Terminal server?  Or by "temp outside user" you mean, that he is on-premise user? You did mention RDC. Please specify.
0
 
LVL 19

Accepted Solution

by:
Patricksr1972 earned 250 total points
ID: 39780303
Hi again,

By explaining what authenticated users define i thought you would understand you cannot alter it. Avoiding it is possible by my solution since you dont authenticate against the DC but a local machine.

About RDP, yes it can IF a) you have an RDP forward in place for this fileserver and b) if you add the new user on the fileserver to be member of the Remote Desktop Users group.

Small note, it is not very good design to have rights distributed to shares based on 'authenticated users'. You see this now.
Better design is to 'group' people in security groups like:
Accountingpeople in security group Accounting, give this group rights to accounting shares.
Helpdesk people in group Helpdeskusers and same policy applies.

This way you cover all your shares and can safely delete the 'authenticated users' permissions from all custom shares.
0
 

Author Comment

by:TMITECHS
ID: 39780323
Patricksr1972
Thanks I will try it.

Jullez
The remote user will connect by Terminal Server.
Although, VPN is not out of the question.
0
 
LVL 19

Assisted Solution

by:Patricksr1972
Patricksr1972 earned 250 total points
ID: 39780334
I need to correct myself here, 'authenticated users' are also local users accounts.

In that case i would try to configure the guest account (which never belongs to authenticated users) for this outside user.

So add guest account to the security group  'outside users'
Plus add guest to the remote desktop users (this i have never tried to do)
0
 
LVL 5

Assisted Solution

by:Jullez
Jullez earned 200 total points
ID: 39780340
If Terminal Server, you can lock down the shared drives. Usually on shared drives, I remove all the permissions and the assign Admin and user rights as needed, avoiding user "everyone" and "authenticated" users. You could also map specific drives just for that user when they start the terminal session, blocking browsing "up". On the terminal server you can lock that temp user in a way that he will only see the desktop, and NTFS+Share permissions will give him very minimal access.
0
 

Author Comment

by:TMITECHS
ID: 39780402
Thanks both, more good info!

J  How to block "browsing up"?
0
 
LVL 5

Expert Comment

by:Jullez
ID: 39780458
Depending on the OS you are using on the file server, you could enable Access Based Enumeration.  This is a feature, enabled at the volume level, that allows you to 'see' only things that you have access to. It should prevent the temp user from being able to get to those top level folders.
0
 

Author Comment

by:TMITECHS
ID: 39780466
thanks.
I will try these things.

I will likely award points tomorrow after some testing.
0
 
LVL 19

Expert Comment

by:Patricksr1972
ID: 39780491
Good luck.
0
 

Author Closing Comment

by:TMITECHS
ID: 39785707
Although not completely resolved for me, I appreciate this info that I believe will lead to a solution that I can live with.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Synchronize a new Active Directory domain with an existing Office 365 tenant
This article runs through the process of deploying a single EXE application selectively to a group of user.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question