Avatar of Paul Wagner
Paul WagnerFlag for United States of America

asked on 

Grant drive/folder change permissions to VPN user

A Server 2012 Datacenter user needs full control access in a Server 2012 R2 NTFS folder. The servers are set up via a site-to-site VPN and are in different workgroups. Active Directory for a domain is not involved and won't be. How can I allow the user full rights to the NTFS folder?

Visual of situation:
User generated image
* NTFSVPNWindows Server 2012

Avatar of undefined
Last Comment
Paul Wagner
ASKER CERTIFIED SOLUTION
Avatar of Tom Cieslik
Tom Cieslik
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of Paul Wagner
Paul Wagner
Flag of United States of America image

ASKER

you need to disclosure vpnadmin password
Can you clarify? Do you mean that the risk is entering the admin password in plain text?
Avatar of Tom Cieslik
Tom Cieslik
Flag of United States of America image

password you need to place in BAT or CMD file so someone can read it
Avatar of Paul Wagner
Paul Wagner
Flag of United States of America image

ASKER

Understood. I have admin rights to both so I can enter it myself. I will test and let you know.
Avatar of Tom Cieslik
Tom Cieslik
Flag of United States of America image

Is it working for you ?
SOLUTION
Avatar of Paul Wagner
Paul Wagner
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
VPN
VPN

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or travelling users access to a central organizational network securely. VPNs encapsulate data transfers using secure cryptographic methods and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

26K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo