Google Drive new “Access Checker” features for Google Apps users

google_drive

Google announced today some improvements it’s making for Google Apps users when it comes to file sharing with Google Drive and managing permissions for various users.

The new functionality comes in the form of new “Access Checker” features within the Apps Admin console that will allow admins to select one of three options for file sharing with users:

BbIybqmC7f FyRAczlmuz0Bzf34MxV4EkSSCyB Yx hQqMM6mCaq ONTGBdAn0T1T 2UNiYXLrZkqTlYeTPa50LFXjU8AnMxWC3mJv50UKENz5YD

If an admin allows external, public file sharing (i.e. they’ve checked the box next to Allow users in “X” domain to publish files on the web or make them visible to the world as public or unlisted files), that admin will now be able to say which of the following three options their users will have when sharing files in the scenarios described above:

  • Option 1: Recipients only, their domain, or public (no Google account required)
  • Option 2: Recipients only or their domain
  • Option 3: Recipients only

For admins that allow public file sharing already, the “recipients only, their domain, or public” will be selected by default. Otherwise, the “recipients only or their domain” option will be on by default. Admins can access the new settings once they’ve rolled out under Admin console > Apps > Google Apps > Settings for Drive > Sharing settings. 

B1gfbmXCtfZxiva lCcV5 wT8HWTE7W

Google goes into more detail about the new options in its full blog post here for those that are interested.

Admins can expect to see the new feature rolling out in the next few days.

Stay tuned for more Google Tips & News!

Exeo Google Partner (1)

Don’t forget to Subscribe (On the right)

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn

More Posts

Benefits of Password Complexity

We’re sorry, your password must contain an uppercase letter, a number, a metaphor, a graffiti, a hieroglyph and the blood of a witch. Yes, but why? Password-cracking software uses one of three approaches: intelligent guessing, dictionary attacks, and brute-force automated attacks that try every possible combination of characters. Given enough time, the automated method can

Reach out

Re-Architect

This methodology requires the most effort to implement but it results in the most optimised recurring cost and will provide the best scalability for apps. This involves re-adapting the code of applications and the heavy use of SAAS solutions in order to replace existing hosted applications.

Re-Platform

This method utilizes the power of  PAAS services, like transferring a database to an as-a-service model,  the use of containers for some apps or the use of network/security functions as a service. Greater scalability and lower cost of operation is achieved.

Re-Host (Lift & Shift)

the migration of workloads from  to the cloud without changing the architecture. Machines get to keep their  OS and apps. This is the quickest and easy way to migrate, but since its  utilising IAAS, its is also the most expensive on the long term.