Solved

How to give a temporary remote user limited access to network files

Posted on 2014-01-14
13
378 Views
Last Modified: 2014-01-16
Environment is windows 2003 domain.

We have need for a temporary outside user to have access to only one set of our network folders. I have created a user ID for this user.

How can I prevent them from having access to anything else including areas that can normally be accessed by "Authenticated Users".

Or perhaps, how can I remove this user from "Authenticated Users"?
0
Comment
Question by:TMITECHS
  • 5
  • 4
  • 3
  • +1
13 Comments
 
LVL 20

Assisted Solution

by:Patrick Bogers
Patrick Bogers earned 250 total points
ID: 39780240
Hi

Authenticated users are users who have authenticated to the domain controller.

This outside user does work on premises? In that case you do not create a domain users account on the DC but a local user account on the file server where the folder resides.

Create a security group on that box called 'outside users' and make the new user a member for that group.
Once done delete all memberships beside the outside users and give this group appropiate rights on th folder you want to. This pretty covers your issue i suppose.
0
 
LVL 3

Assisted Solution

by:fredvr666
fredvr666 earned 50 total points
ID: 39780242
You cannot remove the user from Authenticated Users it's a builtin group.
The only way is joning the user to a group and then deny the rights on a directory or file to that group
0
 

Author Comment

by:TMITECHS
ID: 39780282
To: Patricksr1972

This sounds good but will that user now be able to RDC into our network to access the files they need?

To: fredvr666

Thanks I needed that confirmation that I could not remove a user from Auth Users.
But with the method you describe I need to deny all shares at high level and then grant access at one low level folder. Does this seem right? I don' want to risk overwriting my vast array of permissions.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 5

Assisted Solution

by:Jullez
Jullez earned 200 total points
ID: 39780302
How is the user connecting to your network, VPN or Terminal server?  Or by "temp outside user" you mean, that he is on-premise user? You did mention RDC. Please specify.
0
 
LVL 20

Accepted Solution

by:
Patrick Bogers earned 250 total points
ID: 39780303
Hi again,

By explaining what authenticated users define i thought you would understand you cannot alter it. Avoiding it is possible by my solution since you dont authenticate against the DC but a local machine.

About RDP, yes it can IF a) you have an RDP forward in place for this fileserver and b) if you add the new user on the fileserver to be member of the Remote Desktop Users group.

Small note, it is not very good design to have rights distributed to shares based on 'authenticated users'. You see this now.
Better design is to 'group' people in security groups like:
Accountingpeople in security group Accounting, give this group rights to accounting shares.
Helpdesk people in group Helpdeskusers and same policy applies.

This way you cover all your shares and can safely delete the 'authenticated users' permissions from all custom shares.
0
 

Author Comment

by:TMITECHS
ID: 39780323
Patricksr1972
Thanks I will try it.

Jullez
The remote user will connect by Terminal Server.
Although, VPN is not out of the question.
0
 
LVL 20

Assisted Solution

by:Patrick Bogers
Patrick Bogers earned 250 total points
ID: 39780334
I need to correct myself here, 'authenticated users' are also local users accounts.

In that case i would try to configure the guest account (which never belongs to authenticated users) for this outside user.

So add guest account to the security group  'outside users'
Plus add guest to the remote desktop users (this i have never tried to do)
0
 
LVL 5

Assisted Solution

by:Jullez
Jullez earned 200 total points
ID: 39780340
If Terminal Server, you can lock down the shared drives. Usually on shared drives, I remove all the permissions and the assign Admin and user rights as needed, avoiding user "everyone" and "authenticated" users. You could also map specific drives just for that user when they start the terminal session, blocking browsing "up". On the terminal server you can lock that temp user in a way that he will only see the desktop, and NTFS+Share permissions will give him very minimal access.
0
 

Author Comment

by:TMITECHS
ID: 39780402
Thanks both, more good info!

J  How to block "browsing up"?
0
 
LVL 5

Expert Comment

by:Jullez
ID: 39780458
Depending on the OS you are using on the file server, you could enable Access Based Enumeration.  This is a feature, enabled at the volume level, that allows you to 'see' only things that you have access to. It should prevent the temp user from being able to get to those top level folders.
0
 

Author Comment

by:TMITECHS
ID: 39780466
thanks.
I will try these things.

I will likely award points tomorrow after some testing.
0
 
LVL 20

Expert Comment

by:Patrick Bogers
ID: 39780491
Good luck.
0
 

Author Closing Comment

by:TMITECHS
ID: 39785707
Although not completely resolved for me, I appreciate this info that I believe will lead to a solution that I can live with.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Disabling the Directory Sync Service Account in Office 365 will stop directory synchronization from working.
This article explains the steps required to use the default Photos screensaver to display branding/corporate images
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

838 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question