How it Works
Active Directory Remote Access
Aurora™ is an identity-based technology that provides users remote access to your organization’s local network file system. Using Microsoft Active Directory, an authenticated Aurora user is granted access to all of the storage areas to which the user has rights. Aurora includes a default Web browser access module that can access designated network storage areas over an HTTPS-based connection through the means of context-less authentication.
Product Demo Videos
Tired of reading? Check out our videos!
Want to try Aurora out?
Just fill out a request and we will send you a 30-day license and the software.Yes, I do!
Mobile devices can make use of the web interface and documents will be accessed and viewed using that mechanism.
All file system access is performed using the identity of the logged in user (there is no proxy account). Therefore, users are limited to accessing only files and folders that the specific user has the appropriate rights to access. Moreover, for added security, Aurora verifies that all file system operations fall within the bounds of the provisioned paths for the user. What this means is that it is impossible for a malicious user to craft a Web request to access a file system location outside of what is being displayed in Aurora.
Aurora is configured to always use SSL so that traffic is encrypted between the users and the server.
The product installer generates a self-signed certificate for Aurora, but the organization’s network administrator is responsible for importing the organization’s own certificate provided from the vendor of their choice (Verisign, Thaute, etc). For documentation on how to import a certificate, see http://technet.microsoft.com/en-us/library/cc732785%28v=ws.10%29.aspx
Regarding Microsoft IIS security, the network administrator is responsible for following IIS security best practices.