Solved

How to create Mac network (10.6.8 server and 10.4.11 workstations)

Posted on 2014-10-20
5
434 Views
Last Modified: 2014-10-20
Hi guys!

I need to create mac network; I have 5 10.4.11 Power PC workstations, and one 10.6.8 Mac Server running on Intel.

We need shared directory with different levels of privileges.

Do I need to create all shared folder users as local users on the server, so remote users could hook to it?

Guides, and other suggestions and advices are very welcome!
0
Comment
Question by:mrmut
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 10

Accepted Solution

by:
EdTechy earned 500 total points
ID: 40392026
I would setup Open Directory on the server and add my users there instead of setting up local users. You can provide file sharing either way, but Open Directory is intended to be use with network accounts.
Open Directory is simple to setup. Once setup, share the folders, the remote users connect to the server, logs in with the server (Open Directory or local) credentials and is given choices to access any shared folders they have rights to.
All of the access rights can be managed in Server Manager.
0
 

Author Comment

by:mrmut
ID: 40392068
Thank you.

I think I got it.

Do you know of any tutorial?
0
 
LVL 10

Expert Comment

by:EdTechy
ID: 40392262
Not really a tutorial but information from Apple.
https://www.apple.com/support/osxserver/cachingservice/
0
 
LVL 10

Expert Comment

by:EdTechy
ID: 40392830
Sorry. I just noticed the link I gave you was intended for a different post. This link might get you closer.
https://help.apple.com/serverapp/mac/4.0/#/apdD1F7D8CA-CF07-40CE-B2D4-8E3ACF4BCA40
0
 

Author Comment

by:mrmut
ID: 40392909
thanks for an update
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SUMMARY Enterprise backup in a heterogeneous network is a subject full of complications and restrictions. Issues such as filename & path structure, attributes and extended metadata always tend to complicate the subject to the extent where either …
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question