Setup Folder Permissions
See why customers enjoy using Pleasant Password Server with a KeePass client
Included is an explanation of the permission structure, and a few sample folder structures are provided. These will give you ideas towards setting up your organization's permissions.
Other Related Topics:
Setup Password Folders
Department Teams can be separated into their own folders, and assigned their own levels of access. Below is a great example of what an organization folder may look like.
To get started, first add branches under the Root folder, e.g. Clients, Common Shared, Internal, etc.
Example Folder Structure
Example of Granting User Access
Here is an example of assigning access to user roles on these folders. This explains what access the users/roles will have when granted.
Granting User Access:
To User / Role A: directly on Root
A will inherit access to all the Accounting, Department folders, HR, IT and subfolders
- To User/Role B: with access on IT
B will also have access to Networking and Servers
- To User/Role C: with access to IT and HR
C will NOT have access to Accounting, Department 1, or Department 2
- To User/Role D: with access on Accounting Sub1
D will only have access to Accounting Sub1
Folder Permission Structure
The permission structure is hierarchical. User access is assigned in a folder (e.g. Root), which diffuses down to all Folders / Subfolders / Entries beneath it (see example above).
- Simply assign user/role access to the highest level of folder tree. The permissions automatically spread throughout the whole subtree underneath, providing access to all subfolders / entries below it.
New subfolders / entries will also be automatically accessible.
These permissions continue until the permission inheritance is manually Blocked.
- By default users are given the User role. Providing access to this role is giving access to everyone.
- By default the admin user is assigned the Administration Role on the Root folder. It will have access to everything below it, unless the permission inheritance is manually Blocked.
For examples of using restricted administrative users, see: Limited Admin Access