Configuring Users, Permissions, and Directories
In previous tutorials, we've covered fundamentals, software selection, and installation/initial setup. Now, we'll focus on configuring users, permissions, and directories - the core of controlling access in your file transfer server. This ensures only authorized users can upload, download, or view files, preventing unauthorized access and maintaining security.
Remember: Users are accounts for authentication, permissions define what they can do (e.g., read/write), and directories are the folders where files live (often with virtual mappings for security). We'll cover built-in Windows tools first, then Sysax Multi Server for multi-protocol support (FTP, FTPS, SFTP, SCP, HTTPS). Use Sysax FTP Automation for client testing.
Practice in a test VM. Assume Windows Server 2022/2025 with setups from the previous tutorial. Always change default passwords and test changes incrementally.
Configuring Built-in Windows Tools
Start with native options for simplicity. These integrate with Windows users and NTFS permissions.
1. IIS for FTP/FTPS
- Users: IIS uses Windows or virtual users. In IIS Manager: Sites > Your FTP Site > FTP Authorization Rules > Add Allow Rule.
- Select "Specified users" > Enter username (e.g., a local Windows user like "TestUser").
- For domain users: Integrate with Active Directory by using
domain\username
.
- Permissions: Set read/write via rules. In the same rule: Check Read/Write as needed.
- For finer control: Use NTFS permissions on the physical folder (Right-click folder > Properties > Security > Edit > Add user > Set Allow/Deny for Read/Write/Execute).
- Directories: Define virtual directories for aliasing. In IIS Manager: Right-click FTP Site > Add Virtual Directory.
- Alias: e.g., "uploads"; Physical path:
C:\FTPRoot\Uploads
. - Apply NTFS permissions to the physical path.
- Alias: e.g., "uploads"; Physical path:
- Test: Create a local user in Computer Management > Local Users and Groups > New User.
2. SMB for File Sharing
- Users: Windows local or AD users/groups. Share Properties > Permissions > Add > Select users/groups.
- Permissions: Share-level (Read/Change/Full) + NTFS (finer-grained). NTFS: Properties > Security > Add user > Set Modify for write access.
- Directories: Shared folders are "directories." Create subfolders and apply inheritance (Advanced Security Settings > Enable inheritance).
These are basic but limited - Sysax offers more granular control.
Configuring Sysax Multi Server
Sysax Multi Server excels in user management across protocols, with GUI and web-based administration. It supports stand-alone Sysax accounts, Windows NTLM, Active Directory/LDAP, public keys for SFTP, and MFA (Cisco Duo or Radius).
1. Accessing the Sysax Control Panel
- From the Start Menu, Select and open "Sysax Multi Server Administrator".
- Click onManage Server Settings.
2. Configuring Users
Sysax supports multiple authentication methods and user account types; we'll cover stand-alone and AD/Windows.
For Stand-Alone Sysax Users:
- In Sysax control panel: Go to Manage Server Settings > Authentication Methods Select "Sysax local user account" type.
- Click "Configure accounts" to open the Sysax Account Manager.
- Click "Add" to open the Add User screen.
- Enter: Login (username), Password, Home path (e.g.,
C:\FTPUsers\username
- browse to select). - Click OK to create.
- Optional: Import via CSV—Click "Import CSV...", select file with format:
username,password,homepath,homeperm,accdisabled
(e.g.,testuser,pass123,C:\home,RWDL CX,0
). homeperm
: R=read, W=write, D=delete files; L=list, C=create, X=delete folders.
For Active Directory or Windows Accounts:
- In Sysax Control panel: Manage Server Settings > Authentication Methods > Select "Active Directory or Windows Accounts."
- Click next until "Home Path Permissions for Active Directory or Windows Accounts."
- Click "Add Account Name" > Enter username or
domain\username
. - Optional: Check "Force home path for account" > Browse to set path (e.g.,
C:\ADUsers\username
). - Save changes.
For all users: Enable protocols (e.g., disable FTP for a user via checkboxes), set max connections (e.g., 5), and timeout (e.g., 300 secs).
Protocol notes: For SFTP/SCP, enable public key auth by uploading keys in user settings.
3. Setting Permissions
Permissions apply to home paths and additional paths (acting as virtual directories).
- After adding user: In Account Manager or Permissions screen, select user.
- Under "Permissions for accessible paths": Check boxes for:
- Files: Read, Write, Delete.
- Folders: List, Create, Delete.
- For directory-specific: Highlight a path > Edit permissions individually.
- Add new paths (virtual mappings): Click "Add path" > Enter alias (e.g.,
/uploads
) and physical path (e.g.,D:\Shared\Uploads
). - Delete unwanted paths with "Delete path."
- For AD/Windows: In Manage Server Settings > Authentication Methods > Click Next until Home Path Permissions screen, select account > Check permissions as above.
Security features: Restrict by IP (Manage Server Settings > Security Settings > IP restrictions), auto-block failed logins.
4. Managing Directories
Directories are tied to home paths and added paths.
- Create physical folders first (e.g., via Command line:
mkdir C:\FTPRoot
). - In Sysax: Map as home or added paths (virtual for aliasing, e.g.,
/secure
maps to hidden physical folder). - Hidden files/folders: In Manage Server Settings > File Transfer Management > Manage Hidden Files and Folders, configure visibility.
- Centralized home paths for AD: Set in Manage Server Settings > Authentication Methods > Click Next until Centralized Home Paths > Define base directory (e.g.,
C:\Users\%username%
). - Apply NTFS for extra layer: Right-click folder > Security and Sync with Sysax permissions.
Testing Configurations
- Server-side: Log changes in Sysax logs (Manage Server Settings > Administrative settings > Server Log Tab).
- Client-side: Use Sysax FTP Automation - Create task > Connect with test user > Try upload/download to verify permissions (e.g., write should succeed/fail as set).
- Cross-protocol: Test SFTP with WinSCP, HTTPS via browser.
Troubleshooting Common Issues
- User Can't Log In: Check password, enabled protocols, IP restrictions. Verify AD connectivity if used.
- Permission Denied: Double-check checkboxes and NTFS (use
icacls /reset
to reset if needed). - Directory Not Visible: Ensure list permission; check hidden settings.
- AD Errors: Ensure server domain-joined; test with
dsquery user
. - Sysax-Specific: Restart service if changes don't apply (Services.msc > Sysax Multi Server > Restart).
Key Takeaways and Next Steps
Configuring users, permissions, and directories secures your transfers - use AD for enterprise scale, stand-alone for simplicity. Sysax's interface makes it beginner-friendly with protocol flexibility.
In the next tutorial (Security Best Practices), we'll harden your setup.
Practice: Add a test user in Sysax and restrict to read-only.
Glossary Additions:
Home Path: User's default landing directory.
Virtual Directory: Alias for a physical folder, enhancing security.
You're making great progress—keep experimenting!