Unleash the collaborative potential of your team - with remote, identity-based access to your mission-critical files.

Because Work Doesn't Always Happen In the Office

When your organization's network storage is mounted locally, it can be difficult to work from a remote environment. With more and more need for accessibility outside the office, you can't always download the files you need ahead of time or have them sent via email. But what if there was a way to access your network storage, with the same file permissions, from any web-enabled computer?

The Concept is Simple

Any authenticated Aurora user is granted access to all of the storage areas to which they have rights in Active Directory. By utilizing an easy-to-use Web browser, individuals also have all the same file usage capabilities as when working locally.

Network storage is secure and users have the ability to get more done, no matter where work takes them. 


Remote, Web-based Access to Windows Folders

Have access to user and group share folders from remote, web-based locations.

Automatically Mounts Storage

No need for login scripts, Aurora automatically mounts all storage without them once a user has authenticated access.

Easy-to-Use, Intuitive Interface

Web browser based management interface

Eliminate the Need for Email Attachments

This soon-to-be released module will provide file sharing capabilities that allow providers to grant intended customers access to files or entire folders on the network. Administrators will manage policies and rules for access both in and outside of the organization.

Robust, Permission-Based File Access

Create folders, upload/download multiple folders and files at once, rename, delete, copy and paste files and folders, along with search and filter options.

Never Be Disconnected Again

Just fill out a request and we will send your FREE trial license.

Sign me up!

Product Demo Videos

Tired of reading? Check out our videos! 


See these videos and more on our YouTube channel


Does Aurora support mobile devices?

Mobile devices can make use of the web interface and documents will be accessed and viewed using that mechanism. 

Can you explain the security built into Aurora?

All file system access is performed using the identity of the logged in user (there is no proxy account). Therefore, users are limited to accessing only files and folders that the specific user has the appropriate rights to access. Moreover, for added security, Aurora verifies that all file system operations fall within the bounds of the provisioned paths for the user. What this means is that it is impossible for a malicious user to craft a Web request to access a file system location outside of what is being displayed in Aurora.

Aurora is configured to always use SSL so that traffic is encrypted between the users and the server.

The product installer generates a self-signed certificate for Aurora, but the organization’s network administrator is responsible for importing the organization’s own certificate provided from the vendor of their choice (Verisign, Thaute, etc). For documentation on how to import a certificate, see

Regarding Microsoft IIS security, the network administrator is responsible for following IIS security best practices.