Skip to main content

Shared File Services Articles

back
Show titles with any search term.
  • Permissions and Access

    • You can access a share from a non-Cornell AD computer as long as the computer has a valid Cornell (Ithaca campus) IP-address, and the user has a valid CornellAD NetID. Non-CornellAD...
    • To access a share from off-campus, for example while traveling or from home, use the Virtual Private Network (VPN). The computer appears the same as any other on-campus computer. VPN authenticates...
    • Access to SFS shares will be restricted to on-campus IP addresses (including VPN). No encryption is built into the SFS service. Customers can use their own encryption tools...
    • When you reset your Cornell NetID password you may need to log out and log back in again, in order to regain access to shares from SFS.
    • Access-Based Enumeration enables users to see only a subset of files or directories to which they have access permissions when browsing content, versus seeing the complete set of files and...
    • Apple macOS and CIFS, lessons learned and tips for managing performance
    • The typical minimal ACLs required on a folder or files in order for startup or login scripts to function include: Read and execute List folder contents...
    • Access to shares is handled by the administrative contact for the share via ACLs, typically the department's technical support provider.
    • Who can see my share? All Cornell AD authenticated users can see that the share exists. See also Who can access data in my share? Who can access data in my share? After you...
    • SFS is not designed to be a “high-performance” file system, such as might be required for data-intensive storage demanded by parallel computing applications (big data)....
    • Verify that student accounts are included in any CornellAD Groups used to regulate access to your share. If a student’s CornellAD account is not activated, or if the account has...
    • Unexpected changes to the ACL on the contents of your share may be caused by the following: On a Windows File System an end user may have the ability to alter the ACLs for a...