Authenticated Users Group Question

I have a quick question regarding the Authenticated Users "group". I used to be a systems administrator, but I'm a bit rusty since I've been a software developer for the last 10 years. A conflict with data center operations (DCO) group
at work lead me to get another opinion.
The question is this... is the authenticated users group a domain-level group or is there a local authenticated users group that would allow only users authenticated locally? We have a share that permits the authenticated users group access.
My opinion is that all domain users who have authenticated successfully have access to this share. The DCO group is telling me that this is the local (to the server containing the share of course) authenticated users group only.
Is there such a thing as a local-only authenticated users group? To me this doesn't even make sense, but I could very well be wrong.
Nathon Dalton
Sr. Software Engineer
Blog: http://nathondalton.wordpress.com

I apologize. I don't think I explained myself correctly. Let's consider the following...
SERVER: SERVER1
DOMAIN: DOMAIN1
SHARE: \\SERVER1\SHARE1
SHARE PERMISSIONS: Authenticated Users - Full Control
Given the above information, is it possible that the Authenticated Users group will allow ONLY users that are defined on SERVER1 to access \\SERVER1\SHARE1?
My understanding is that's not possible. There's one defined Authenticated Users group and that represents ALL users that are authenticated against DOMAIN1, whether added to local groups, shares, etc.
What I'm being told however is that SHARE1 having Authenticated Users assigned is okay since only those user accounts defined on SERVER1 will be able to access it. All the users in the domain will NOT be able to access it. I think this is bogus. Am I wrong?
Nathon Dalton
Sr. Lead Developer
Blog: http://www.nathondalton.com

Similar Messages

  • Everyone Group vs. Authenticated Users Group

    Two questions.....
    1.) What is the difference between the "Everyone" group and the "Authenticated Users" group.
    2) We are starting to use some new BI content (NW04s) in our federated portal and have found that we have to grant permissions to "Authenticated Users" instead of the "Everyone" group. Any ideas why?
    Regards,
    Diane

    Diane,
    The following asnwer is not a SAP answer but I did a quick check on our system and:
    1. the difference between the group Everyone and Authenticated users is exactly 1 user assignment.. I looked further and see that it has to do with the J2EE_GUEST user. this user is member of the group Everyone but NOT of the group Authenticated users.
    2. Can not give you a sure anser on this question but maybe it has to do with security that this is needed?!?!\
    Hopfully another SDN community member can fill me in here...
    Good luck and Kind Regards,
    Benjamin Houttuin

  • Authenticated Users Group

    As I understand the AU group is made up by any user that logs in. However, it does not work when I specify access to a TAB page so is only visible for AU. In this case the TAB is also available for the PUBLIC user.
    I am working with Portal 3.0 EA on an Intel/NT plataform, my question is: is this the way that was supossed to be or it is something that has to do with the version that I am using...?
    Thanks

    I apologize. I don't think I explained myself correctly. Let's consider the following...
    SERVER: SERVER1
    DOMAIN: DOMAIN1
    SHARE: \\SERVER1\SHARE1
    SHARE PERMISSIONS: Authenticated Users - Full Control
    Given the above information, is it possible that the Authenticated Users group will allow ONLY users that are defined on SERVER1 to access \\SERVER1\SHARE1?
    My understanding is that's not possible. There's one defined Authenticated Users group and that represents ALL users that are authenticated against DOMAIN1, whether added to local groups, shares, etc.
    What I'm being told however is that SHARE1 having Authenticated Users assigned is okay since only those user accounts defined on SERVER1 will be able to access it. All the users in the domain will NOT be able to access it. I think this is bogus. Am I wrong?
    Nathon Dalton
    Sr. Lead Developer
    Blog: http://www.nathondalton.com

  • Authenticated User group

    We have following doubt regarding Authenticated User group in Windows 7
    1. When this user group is added to a Drive/folder/file automatically.
    2. As per our observation, mostly it shows in the drive in which OS is installed. On some machines it shows in other drives. How  this is added in other automatically.
    3. Another observation is, due to the presence of this group, it is possible to write a file(which is created by administrator or system) with an application which is started with Standard User token.  So do we need to add any extra permission to work
    our application(with standard user token) to read and write to the folder/file with Authenticated User group.
    4.  Is it possible that Authenticated User group will not exist in OS installed drive.
    5. Is it possible that an application with standard user cannot write to a file/folder even if Authenticated User group is present for the same.
    Thanks, Renjith V R

    Hi,
    To learn more about authenticated users group, you can refer to the related thread:
    http://social.technet.microsoft.com/Forums/windowsserver/en-US/e1a8e680-03a2-4690-a7e5-f17ad7389ecd/authenticated-users?forum=winserverDS
    Andy Altmann
    TechNet Community Support

  • Reg Authenticated Users Group

    Hello Everyone.
    We created two Roles Role1 and Role2 for this Roles we have assigned the Group "Authenticated Users"
    Now the client requirement is they wants to remove couple of users who are assigned to Role1(who belong to "Authenticated Users" group.
    Though it is not a good practise One thing I can do is search for the group "Authenticated Users" in portal  then choose modify and choose assigned users and remove the users from this group.So,that they can not see Role1
    If I remove the users from the group "Authenticated Users" then they will not be able to see Role2 as they are removed from the "Authenticated Users" group which is assigned to Role2
    Can anyone help me out regarding this issue.

    Hi Shailesh,
    What you understood is correct ie  "Both the users have been added to Role 1 and Role 2, and both the roles have been assigned to "Authenticated Group".
    I tried the step what you have stated.
    once I login to portal --- User administration -- identity management
    search for the user.
    choose modify
    if I click on assigned roles I do not see either Role1 or Role2 under assigned roles
    but if i click on assigned groups I see " Authenticated  Users"
    thanks in advance

  • Afaria User Group question

    Hello,
    I have a qustion regarding User Groups in Afaria.
    If I have configured the active directory authentication in the Security settings of the Afaria Server.
    I also configured 2 AD groups where my user is in 1 of the group and 2 User groups in Afaria, that shows to the AD groups.
    SAP told me if I use the "User Name" variable in the enrollment code, I can use the user groups for the devices.
    I tested it with the standard Afaria Client from the appstore without success. Only if I enroll via the Self Service Portal the device are bound to the user group I created.
    Is it really only possible via the SSP?
    Thank you and best regards
    Michael

    Super.
    We have used this:
    USE [Afaria70]
    GO
    /****** Object:  Trigger [dbo].[MA_TR_IPhone_Device]    Script Date: 08/18/2013 22:51:30 ******/
    SET ANSI_NULLS ON
    GO
    SET QUOTED_IDENTIFIER ON
    GO
    -- =============================================
    -- Author:            Peter Mohr
    -- Create date:
    -- Description:
    -- =============================================
    ALTER TRIGGER [dbo].[MA_TR_IPhone_Device]
       ON [dbo].[A_IPHONE_DEVICE]
       AFTER UPDATE, INSERT
    AS
    BEGIN
    -- SET NOCOUNT ON added to prevent extra result sets from
    -- interfering with SELECT statements.
    SET NOCOUNT ON;
        Update D
        SET D.AssignmentsUserName = D.SelfServiceUserName
        FROM A_IPHONE_DEVICE D
        INNER JOIN Inserted I ON I.arowid = D.ARowID
        WHERE I.SelfServiceUserName IS NOT NULL
    END
    BR
    Peter

  • Weblogic on Unix, authenticating users/groups from NT domain controller

    Hi!
    Our weblogic 6.1 server will eventually run on a non-windows platform, but
    needs to authenticate users from a Windows NT 4.0 domain controller. What's
    the best solution to this?
    - What (inexpensive) LDAP-servers supports synchronization with a Windows
    domain controller?
    - Or am I missing out on other ways of doing this?
    jan henrik

    Yes. Other instrinsic jobs are failed too. Does this related to Job Dispatcher service? Thank you for your help.

  • Peap AUthentication User Group issue

    Dear All,
    I have a strange problem. We are running Wireless service which includes Cisco AP1200 (B&G), radius server ACS 4.0, WPA/TKIP. We have two setups, one for trusted machines which are part of our domain, other is untrusted which is from students. We have also setup groups in ACS 4.0 to allocate the required Vlan accordingly.
    When untruisted machine logs in, it gets the required vlan which is fine. But when on the same machine I log in with domain account it get us the trusted machine ip address which is not right.
    Is there any way I can stop this behaviour because if some with untruested machine logs in with the domain account, he/she will get the ip which is only for trusted machines.
    Two Vlan are with two ssid'S.
    I will be thankful, if someone could help me in this seyup issue.
    regards
    Khaleefa

    Try these links:
    http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00801df0e4.shtml
    http://www.cisco.com/en/US/products/ps6366/products_configuration_example09186a00807917aa.shtml
    http://www.cisco.com/en/US/products/hw/wireless/ps430/prod_tech_notes_list.html

  • Groups Authenticated users & Everyone difference

    Hi Everyone,
    There are builtin groups Authenticated users & Everyone.  when i check for some iviews, folders, their permissions are set to Everyone with enduser as checked and for some objects, the permissions are given as Authenticated users group with enduser as checked. 
    What is the difference between these two.  All the ESS/MSS objects has given the permission as Authenticated users group with Enduser checked. 
    anyone clarify this doubt.
    Regards,
    EP.

    Hi,
    There are two kinds of Properties for an Portal Content Object,
    1. Administrator Permission- create/modify/read/ permissions etc privilatges on the object. These are Design Time Permissions
    2. EndUser- When a user is assigned a end User Permission, he can view the content at runtime i.e. If the iView is assigned to the User (via iView assigned to a role, and role has an entry point and assigned to the user) and he has only the end user Permission, then he can login and view the runtime content only. A kind of end user privilage.
    Now,
    1. Authenticated Users: the Users who have entered their logon info/ used a certificate to Login to the Portal/ to say users who have authenticated themselves to Portal  are the Authenticated Users. The User Group is named so.
    2. Everyone- All the Users- Authenticated or not fall in this group. Sometimes Content can be accessed directly with a URL without any Logon.
    Based on who can access the End user Content, the End User permission is provided in Permission settings, i.e.in the ACL of that Object.
    Hope this answers your question. Reward points for Helpful answers.
    Thanks,
    Vamshi

  • "Authenticated Users" vs. "Users"

    I'm setting up a profiles structure on a server starting with the master folder that'll house all the profile subfolders.  the default permissions on a newly created folder always has the admins and creator/owner and system accounts, but by default
    it also has Users.  Yet in some pre-existing installations I've come across I've seen Authenticated Users put there instead, so the admin must have had a reason. 
    So the question is, what's the difference?  Since any domain user would have to authenticate to get into any resourcse anyway, is this not just the same thing?  What would be a scenario whereby you should use one over the other? 
    Thanks! 

    Authenticated user group is builtin user group & any user created in domain default became member of this group, where as you can't see or manually modify authenticated user group to add or remove members. Authenticated user group can't be added into
    user created groups like Global/Domain local/Universal group but it can be added to built in domain local group in AD. Even it contains member of trusted forest. Authenticated user group membership is controller by OS.
    Domain user group is a global group & it too contains all the users from domain where as its member can be managed like manually can be added or removed by administrators. Domain user group is visible in ADUC console.
    http://technet.microsoft.com/en-us/library/cc756898%28WS.10%29.aspx
    Regards
    Awinish Vishwakarma| CHECK MY BLOG
    Disclaimer: This posting is provided AS-IS with no warranties or guarantees and confers no rights.

  • WLS 8.1.5  console doesn't show ActiveDirectory (or custom) Users/Groups

    We currently have numerous apps running on a weblogic 8.1.4 portal domain. I am attempting to replicate this domain on 8.1.5. There are four authenticators on our old domain: a DefaultAuthenticator, an ActiveDirectoryAuthenticator, and two Custom Authenticators (based on the sample database authenticator), with JAAS flags set to OPTIONAL for all. Everything was working properly under sp4, including user/group/membership listings in console and authentication. Under sp5, while simple authentication seems to work with all providers, the user/group/membership listings in weblogic console have bad HTML (empty rows under any default authenticator users/groups). The active directory settings were migrated wholesale and I verified that authentication works against this provider. Just no usernames or groupnames. I tested with just ActiveDirectory and DefaultAuthenticator, DefaultIdentityAsserter.
    <p>
    I was able to debug a bit more using our custom authenticators. I have verified that the user and group lists are being requested and returned properly when you click on Manage Users or Manage Groups in weblogic 8.1.5 console. It just seems like somewhere in the console there is a problem and the HTML output is garbled. Here is a sample of my debug text, the method names and classes should be immediately familiar from the sample authenticator:
    <p>
    getUserLoginNamesMatching(*,50)<br>
    loginNames=[BF, DAD, NA, OTN, P1Adm1, P1User1, P2Adm1, P2User1, S, ab, admtest, gw, jb, joeschmo, kw, mf, mh, pa, rn, rt, super, test1, wf]<br>
    Success: listUsers(userNameWildcard = *, maximumToReturn = 2147483647) = Cursor0<br>
    Success: haveCurrent(Cursor = Cursor0) = true<br>
    Success: getCurrentName(Cursor = Cursor0) = BF<br>
    Success: advance(Cursor = Cursor0)<br>
    Success: haveCurrent(Cursor = Cursor0) = true<br>
    Success: getCurrentName(Cursor = Cursor0) = DAD<br>
    Success: advance(Cursor = Cursor0)<br>
    Success: close(Cursor = Cursor0)<br>
    getExistingUser(BF)<br>
    user=new UserEntry( BF, BF , BF, [PDA, ADM], com.otn.mobilelynx2.security.providers.authentication.UserGroupDatabase@7f5e61 )<br>
    Success: getUserDescription(user = BF) = BF<br>
    getExistingUser(DAD)<br>
    Success: haveCurrent(Cursor = Cursor0) = false<br>
    Success: close(Cursor = Cursor0)<br>
    getExistingUser(BF)<br>
    user=new UserEntry( BF, BF , BF, [PDA, ADM], com.otn.mobilelynx2.security.providers.authentication.UserGroupDatabase@7f5e61 )<br>
    Success: getUserDescription(user = BF) = BF<br>
    getExistingUser(DAD)<br>
    user=new UserEntry( DAD, Dummy Alcanto Demoer, LYNX, [PDA], com.otn.mobilelynx2.security.providers.authentication.UserGroupDatabase@7f5e61 )<br>
    Success: getUserDescription(user = DAD) = Dummy Alcanto Demoer<br>
    getExistingUser(NA)<br>
    user=new UserEntry( NA, Nancy Aarons, 1234, [PDA, ADM], com.otn.mobilelynx2.security.providers.authentication.UserGroupDatabase@7f5e61 )<br>
    Success: getUserDescription(user = NA) = Nancy Aarons<br>
    ---- weblogic console output sp4, Manage Users ----
    User Description Provider <br>
    portaladmin Admin for portal domain DefaultAuthenticator <br>
    weblogic This user is the default administrator. DefaultAuthenticator <br>
    yahooadmin Admin for yahoo content DefaultAuthenticator <br>
    john John Smith DefaultAuthenticator <br>
    qamean ActiveDirectoryAuthenticator <br>
    qamin ActiveDirectoryAuthenticator <br>
    ---- weblogic console output sp5, Manage Users ----
    User Description Provider <br>
    portaladmin Admin for portal domain DefaultAuthenticator
    weblogic This user is the default administrator. DefaultAuthenticator <br>
    yahooadmin Admin for yahoo content DefaultAuthenticator <br>
    --- html for above (with weird empty rows) ---
    <FORM NAME=FilterUsers METHOD=POST ACTION=><P>Filter By: <INPUT TYPE=text NAME=filter SIZE=10> <INPUT CLASS='buttons' TYPE=submit VALUE=Filter></FORM><b>Displayed 68 of 357 Total, use filter to narrow your search results.<b><table border='1' cellpadding='4' cellspacing='0' height='20'><tr bgcolor='#b8cece'><th>User</th><th>Description</th><th>Provider</th><th> </th></tr><tr bgcolor='#FFFFFF'><td>portaladmin</td><td>Admin for portal domain</td><td>DefaultAuthenticator</td><td><img border='0' src='http://localhost:7001/console/images/delete.gif' title='Delete'/></td></tr><tr bgcolor='#FFFFFF'><td>weblogic</td><td>This user is the default administrator.</td><td>DefaultAuthenticator</td><td><img border='0' src='http://localhost:7001/console/images/delete.gif' title='Delete'/></td></tr><tr bgcolor='#FFFFFF'><td>yahooadmin</td><td>Admin for yahoo content</td><td>DefaultAuthenticator</td><td><img border='0' src='http://localhost:7001/console/images/delete.gif' title='Delete'/></td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr><tr bgcolor='#FFFFFF'><td><td><td></tr></table>
    Message was edited by:
    srhutch444

    i have reinstalled solaris and the problem continues.
    Under Solaris Management Console groups and users doesn't run ok. Editing an user i can't see groups and editing groups i can't see its users...very very extrange.
    A bug?
    I don't know what is happening :(

  • External table authentication not updating user group changes

    Hello
    I have a question..
    In OBIEE, i am using external table authentication. I have user and user group tables where users and groups are stores.. Every Time I create a new user and assign them to a group, these records get inserted immediately to these tables with the correct user and group ID that matches with each other.. Then in my initialization block I have the query that fetches the user name and psswd as well as groups names..
    All these are working at the initial user creation. For example, when I create user A and assign it to group A, the DB table has all of the records inserted correctly. When I log in to OBIEE using User A login, I see it is assigned to Group B.
    The problem comes when I change the user A from Group B to Group C. When I did that, although the DB table gets updated correctly, OBIEE session seems to still be the previous one. As a result, when I log in the second time, I see the user A is still assigned to Group B instead of Group C.. This seems to be cached..
    I double check these user tables in OBIEE, none of them are cache enabled.. The connection pool setting of the isolation level is set as default..
    When I reinstall OBIEE all over again and re-log in the first time, this User is now assigned to Group C..
    So seems to be that it is caching issue.
    How should I go about solving this issue
    Appreciate in advance

    Make sure you check the box for 'Required for authentication' and also 'Use caching' should not check.
    Edited by: Srini VEERAVALLI on May 15, 2013 9:05 PM

  • Active Directory Authentication and permissions for user group in APEX 4.0

    Hello,
    I am new to oracle APEX and I have searched the forum for active directory authentication for a user group and I am really confused about all the different threads. Can anyone please provide me the steps to follow; in order to implement AD authentication for a user group in Oracle APEX 4.0.
    These are the threads which i was looking at to get an idea like how AD authentication works but its really confusing for me.
    Help with Authentication (APEX_LDAP.AUTHENTICATE)
    Re: LDAP Authentication Via Groups
    Thanks,
    Tony

    You need to give it more than 30 minutes before bumping your own post. This is not an official support channel, so you need to be patient and wait for people to read, think and respond.

  • Authentication and Authorization question.

    Hi All,
    I require your help in getting validated my understanding on Authentication and Authorization. This is wrt to WebLogic Server and WebLogic Portal.
    Authentication.
    1. The custom authentication provider can authenticate(user and group) against any datastore(LDAP OR DB). The LoginModule is a kind of blockbox and it can return true/false depending on authentication.
    2. The end result of this process is true/false.
    Authorization.
    1. The custom authorization providers can authorize the authenticated user based on role. All these entities ie(user,group,role) can be either in LDAP OR DB.
    2. The end result of this process is true/false.
    Role mapping.
    1. The custom role mapper can put all the roles that a user belongs and returns all Role. This can happen agaist LDAP OR DB.
    2. The end result is list of roles for a user.
    Security policy configuration.
    Is it mandatory that a user/group/role should be existing in WebLogic Server LDAP server(OR Portal LDAP server) to create these policies and authorization rules. What i mean by is that can user,group,role can exist in application specific database and still can be used for creatiing security policies??
    Thanks,
    Prashanth Bhat.

    The Security Providers are useful/can be used for developing a standard j2ee application , which will be deployed as standard j2ee application.
    The DA means Delegated Administrator, which is way how portal components are restricted to different types of administrators.
    The VE means Visitor Entitlemens, which is way how portal components are restricted to end users.
    My question is whether thess(DAs and VEs) can also be put
    our datastore for access rights??
    Thanks,
    Prashanth Bhat.

  • Cannot prevent authenticated users from creating a blog on "My Page"

    I have a brand new Snow Leopard (10.6.1) 2.26 Ghz quad core Xserve with 12Gb RAM that will be used for web collaboration services. I've currently set up Wiki and Blog services with a group membership to allow creating wikis/blogs. The reason for this is for staff development purposes with the plan to add people into the group as they are trained. The process to set it all up was very simple, however, I'm having an issue preventing authenticated users from creating a personal blog. Although I can prevent the creation of wiki's to members of a group easily, any authenticated user on the server can log into "My Page" and will be able to create a blog. I've gone to server admin>choose the server>choose the "access" icon and set the column "for selected services below" (blog) to "allow only users and groups below" (the group) and it still doesn't prevent them from making a blog page. In WGM for the group on the "Basic" tab, the "enable the following services for this group" has only the choice of "none" and therefore since the site isn't showing as a choice, the Wiki, Blog, Calendar and Mailing List is grayed out. I've seen another thread that states in 10.6 that option for setting the service acl in the group settings of WGM is unavailable. Does anyone know a fix for my problem of security access for a "My Page" blog or is it a possible bug in Snow Leopard? Right now my only workaround is to remove the users access and enable it as they are trained. This isn't an ideal fix, however, because we have some users who want to limit their wiki or blog to authenticated users only, not public access. Any help will be greatly appreciated.
    Message was edited by: dstrollo.il

    Ran into this same issue.... Talked with a field engineer who confirmed the behavior. The question now is this a defect or "feature that does not work as as the audience desires". As I far can tell, the security setting for blogs in server admin does nothing at all. This has the potential to cause a few issues as you cannot limit who can have a blog.
    Message was edited by: jlindler

Maybe you are looking for