A simple, lightweight solution for remote access to network file shares.
Users log in using their AD credentials and are provided simple, secure access to their files on the network. The interface is built to look and act like Windows so it's intuitive with little or no training required. Any modern browser on most any OS is supported.
You can have Aurora up and running in 30 minutes for your network and your users. Our support team can help as needed.
You are now on the front line for your organization. We’re here to help.
You should have received an email from us about Aurora and our offer to help you.
If you do not currently license Aurora, our offer is for your organization to be able to use the product through the crisis at no charge.
If you do currently license Aurora, but need some extra licenses during the crisis, we will offer a license for those at no charge as well.
If you have licensed our Condrey or Micro Focus-branded software at any point in the past, we still consider you our customers!
Reach out to us by email or by clicking on the “Get the Software” button below. We will provide additional details and get things set up for you.
We are glad that you are here and we stand ready to help you as well.
Our offer to you is to be able to use Aurora for an unlimited number of users for a limited time at no charge.Click the “Get the Software” button below and we will provide details and get licenses and the software to you.
Current partners should have received a communication from us.
As always, we stand with you to help the organizations that you serve. Reach out to us via your contact or just click the “Get the Software” button below.If you are not a current partner, that’s ok! Just reach out to us by following the link on this page and we will help.
Here are the details
Mobile devices can make use of the web interface and documents will be accessed and viewed using that mechanism.
All file system access is performed using the identity of the logged in user (there is no proxy account). Therefore, users are limited to accessing only files and folders that the specific user has the appropriate rights to access. Moreover, for added security, Aurora verifies that all file system operations fall within the bounds of the provisioned paths for the user. What this means is that it is impossible for a malicious user to craft a Web request to access a file system location outside of what is being displayed in Aurora.
Aurora is configured to always use TLS/SSL so that traffic is encrypted between the users and the server.
The product installer generates a self-signed certificate for Aurora, but the organization’s network administrator is responsible for importing the organization’s own certificate provided from the vendor of their choice (Verisign, Thaute, etc). For documentation on how to import a certificate, see http://technet.microsoft.com/en-us/library/cc732785%28v=ws.10%29.aspx
Regarding Microsoft IIS security, the network administrator is responsible for following IIS security best practices.
Securely share folders outside of your organization.
Empower Your Users
Aurora .Ext gives internal users the ability to collaborate more effectively with those outside their organization, without compromising security and without IT intervention.
Watch the video to learn more >>
See How It Works