Introduction – Grass Valley NAS Security Instruction Guide v.5.1A User Manual
Page 9

Digital News Production
7
Introduction
With NAS security, you can control the visibility and access for users and
groups within NewsEdit bins by associating the bins and assets with file system
permissions. NAS security uses the overlapping modes of exclusivity,
propagation of granted permissions, and group membership to establish file
system security. These principals apply:
• Selective access—You create groups of users, such as Editors or Producers,
and set permissions for each group.
• Partial control—You control access to branches of the Bin tree for users and
groups.
• Administrative control—The Administrator has exclusive access to a tool in
the top-level bin that allows the setting of permissions in the top-level bins.
Steps 1-2 can be completed at any time in preparation for NAS Security. Steps
3-8 must be done with the NewsShare system off line, during a maintenance
window.
To use NAS security in your newsroom, follow these steps:
The rest of this manual discusses each of these steps in detail.
Step:
Description
Refer to...
1
Design a security schema
2
Create and configure a Domain Controller
3
Discontinue NAS Service and disconnect DNP workstations
from the drive mapped to the NAS Server
4
Join computers to the new domain
5
Add security to the NAS Server
6
Map DNP workstations to the secure network drive on the NAS
Server
7
Set permissions for the shared volume
8
Test to make sure that security is working