That's how I do it.

Users in groups, and groups with the necessary perms.

Makes it easy when users change roles, or roles change entitlements.

-ASB: http://XeeSM.com/AndrewBaker


On Fri, Mar 19, 2010 at 9:57 AM, Jason Morris <[email protected]> wrote:

>  I’m looking at cleaning up some of our more ornery areas and want to know
> if anybody has some opinions/real world experience they’d be willing to
> share. From my perspective everything is working ok speed-wise but I want to
> know what other people are doing.
>
>
>
> We have a series of folders in one share that not all users with access to
> the share will be utilizing. Some will have “Folder A / Folder B / and
> Folder C” but not “Folder D / Folder E / and Folder F”. And others will be
> mixing and matching.
>
>
>
> I prefer to give groups permissions to the folders and put the users in the
> groups. But this might mean there will be 10 groups on Folder A. This might
> also mean User George will be a member of 20 groups. This is how I have it
> now and it’s working ok speed-wise. (it’s ornery because we’ve had requests
> here and there for individuals to access a folder and we’ve had to tweak
> security for the individual user)
>
>
>
> Is it better/faster to have groups checked in the ACL or have it some other
> way?
>
>
>
> Inquiring minds want to know.
>
> ------------------------------------------
>
> Jason Morris
>
> MJMC, Inc.
>
> P: 708-225-2350
>
> F: 708-943-9015
>
>
>
>
>
>
>
>  
> ------------------------------------------------------------------------------------------
> The pages accompanying this email transmission contain information from MJMC, 
> Inc., which
> is confidential and/or privileged. The information is to be for the use of 
> the individual
> or entity named on this cover sheet. If you are not the intended recipient, 
> you are
> hereby notified that any disclosure, dissemination, distribution, or copying 
> of this
> communication is strictly prohibited. If you received this transmission in 
> error, please
> immediately notify us by telephone so that we can arrange for the retrieval 
> of the original
> document.
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to