Solved

Limitted Access to a Mapped Drive

Posted on 2014-10-06
5
162 Views
Last Modified: 2014-10-07
Hi Experts,

Besides Active Directory, is there any way to restrict users to certain folders of a mapped drive?

The mapped drive is on a NAS, but it can be transferred on to a PC.

FYI- Most "workstations" are Win 7 Home or Win 8 Home Premium, an1 MAC.

Maybe a PHP App?

Thank you.
0
Comment
Question by:APD_Toronto
  • 3
  • 2
5 Comments
 
LVL 108

Expert Comment

by:Ray Paseur
ID: 40364093
You can limit client access with PHP client authentication.  I don't know how the "mapped drive" plays into the issue, but I can show you the design pattern for PHP client authentication.
http://www.experts-exchange.com/Web_Development/Web_Languages-Standards/PHP/A_2391-PHP-login-logout-and-easy-access-control.html
0
 

Author Comment

by:APD_Toronto
ID: 40364305
When you map a drive, there's an option to connect using different credentials.  What is that?

Can you map/un-map a drive using a batch or .vbs file?

Can you password-protect a folder, like in the old days?

Any other ideas?

Even with an Active Directory, can't any user type in \\share\, then browse any folder?
0
 

Author Comment

by:APD_Toronto
ID: 40364330
Is there a NAS that can be password-protected when entering \\mynas\ or \\mynas\specificfolder\?
0
 
LVL 108

Accepted Solution

by:
Ray Paseur earned 500 total points
ID: 40364992
@APD_Toronto:  Suggest you delete this question and repost it without the PHP Zone.  Many of the E-E community will see that we engaged in a dialog and will assume that it's getting handled, but I don't think this is headed in the right direction to give you the most suitable answer.  

Best regards, ~Ray
0
 

Author Closing Comment

by:APD_Toronto
ID: 40366464
Thanks Ray, I decided to keep this in my records.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
restore DAG configuration 1 30
Not needed 13 55
PHP string issue 5 17
hp mini 3 17
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Resolve DNS query failed errors for Exchange
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
The viewer will learn how to count occurrences of each item in an array.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now