Provide users remote access to your organization's local Windows network file system through Aurora.
Active Directory Remote Access
Aurora™ is an identity-based technology that provides users remote access to your organization’s local network file system. Using Microsoft Active Directory, an authenticated Aurora user is granted access to all of the storage areas to which the user has rights. Aurora includes a default Web browser access module that can access designated network storage areas over an HTTPS-based connection though the means of context-less authentication.
Additional modules for Mobile Access, Windows Desktop Access, Mac Desktop Access, and File Sharing will be available for separate purchase soon.
Web Based Access to Active Directory Aurora™ provides a set of features that offer flexibility of access and ease of management.
- Remote access to local network file system.
- Standard Web browser access method
- Mobile access method (available soon)
- Windows desktop access method (available soon)
- Mac desktop access method (available soon)
- File sharing module (available soon)
- Easy-to-use Web browser based management interface
Enables Access from Anywhere Whether it's from a Web browser or from the separately available Mobile, Windows Desktop, or Mac Desktop modules, as long as you have Internet access, you are able to access your network-stored files. Simply authenticate and Aurora™ determines and then establishes access to all of the network folders you have rights to.
Multiple Access Methods In addition to the standard Web browser authentication method, additional access methods will soon be available for purchase separately.
- Mobile Access: Provides access to network-stored files through an extensive set of supported hand-held devices
- Windows Desktop Access: A resource tool installed on the Windows desktop that allows for easy uploading and downloading of files.
- Mac Desktop Access A resource tool installed on the Mac desktop that allows for easy uploading and downloading of files.
Automatically Mounts All User Storage Without Need for Login Scripts Once a user authenticates to the network, Aurora uses the network identity information stored in Microsoft Active Directory to determine all of the storage areas to which the user is entitled access. This method of determining access is much more efficient and accurate than network login scripts and drive mappings.
Eliminates Need for Email Attachments This soon-to-released module will provide powerful file sharing capabilities eliminating the need for email attachments altogether by allowing “providers” to grant intended “consumers” access to files or entire folders from its stored location on the network. Furthermore, this access will be available to specified consumers both inside and outside of the organization. The network administrator will set policies and rules for governing when the files or folders can be accessed and what rights the consumer has to these resources.
Aurora™ has the following system requirements:
- Microsoft IIS 7.5 hosted on a Windows Server 2012, 2008 R2, Windows 8 workstation (64-bit), or Windows 7 workstation (64-bit)
User and Management Interface
- All major brands of Web browsers
Q: Does Aurora™ support mobile devices?
A: A mobile access module is currently being developed and will be available for separate purchase sometime in the future. Additional modules in development include a Windows desktop module, a Mac desktop module, and a File Sharing module.
Q: Is the File Sharing module in development similar to the file sharing capabilities in Condrey Corporation’s DocXchanger product?
A: Yes, but where DocXchanger required a NetWare host for the Engine, the Aurora File Sharing module will be hosted from either a Windows Server 2008 R2 or Windows 7 workstation (64-bit).
Q: Can you explain the security built into Aurora?
A: All file system access is performed using the identity of the logged in user (there is no proxy account). Therefore, users are limited to accessing only files and folders that the specific user has the appropriate rights to access. Moreover, for added security, Aurora verifies that all file system operations fall within the bounds of the provisioned paths for the user. What this means is that it is impossible for a malicious user to craft a Web request to access a file system location outside of what is being displayed in Aurora.
Aurora is configured to always use SSL so that traffic is encrypted between the users and the server.
The product installer generates a self-signed certificate for Aurora, but the organization’s network administrator is responsible for importing the organization’s own certificate provided from the vendor of their choice (Verisign, Thaute, etc). For documentation on how to import a certificate, see http://technet.microsoft.com/en-us/library/cc732785%28v=ws.10%29.aspx
Regarding Microsoft IIS security, the network administrator is responsible for following IIS security best practices.