|Set up Users and Groups|
The Aspera server uses your system accounts to authenticate connections from remote clients. The system users must be added and configured as Aspera transfer users before remote clients can run FASP transfers with the server. When creating transfer users, you may also specify user-specific settings, such as transfer bandwidth, docroot, and file handling.
Follow the steps below to configure a system user account as an Aspera transfer user.
In the Add User dialog, enter the username.
You can require that users log into their accounts using the DOMAIN\username format. This is recommended by Aspera and required for domain users who will transfer with this server through Aspera web applications such as Shares or Faspex .
To set this requirement after a user has been created, click the Options button under the Users tab in the Server Configuration window. Click the Convert existing users button to set the requirement for existing domain accounts.
Individual user docroot: In the user's Docroot tab (Configuration > Users >username > Docroot), select the Override box for Absolute Path and enter or select an existing path as the user's docroot -- for example, C:\sandbox\aspera_user_1 . Make sure that at least the Read Allowed and Browse Allowed are set to true. When finished, click OK or Apply.
Global docroot: To set up a global docroot, in the Server Configuration window, click the Global tab. In the Docroot tab, select the Override box and enter the docroot into the Absolute Path field. This value will be duplicated in all user settings.
If there is a pattern in the docroot of each user, for example, C:\sandbox\username, you can use a substitutional string. This allows you to assign an independent docroot to each user without setting it individually for each user.
|$(name)||system user's name||C:\sandbox\$(name)|
|$(DOMAIN)||domain user's domain name||C:\sandbox\$(DOMAIN)\$(name)|
|$(home)||system user's home directory||$(home)\Documents|
|Document Root||The document root settings.|
|Authorization||Connection permissions, token key, and encryption requirements.|
|Bandwidth||Incoming and outgoing transfer bandwidth and policy settings.|
|Network||Network IP, port, and socket buffer settings.|
|File Handling||File handling settings, such as file block size, overwrite rules, and exclude pattern.|