Skip to main content

Capabilities

ResourceSyncProvision
Folders

How it works

Entitlements

The connector does not create an entitlement for each individual NTFS ACL entry. Instead, it examines all ACL entries (ACEs) on each folder and classifies each one into a generalized permission category:
  • Read Write — The ACE grants any write-level permission (write data, append data, delete, write DAC, write attributes, etc.)
  • Read Only — The ACE grants read-level permissions beyond basic directory listing (read attributes, read extended attributes, read control, generic read)
Every synced folder gets exactly two entitlements: Read Only and Read Write. ACEs that only grant “List folder contents” (i.e., CONTAINER_INHERIT_ACE without OBJECT_INHERIT_ACE) are excluded entirely since they don’t apply to files within the folder.

Grants

Grants connect AD groups to folder entitlements. The connector reads each folder’s DACL and creates one grant per group-folder-permission combination. Several important behaviors to note:
  • Groups only — Only ACEs for Active Directory domain groups (SidTypeGroup) produce grants. Individual user ACEs are ignored, even if a user has direct access to a folder. User-to-folder access is only visible when it flows through an AD group.
  • External matching — Groups are matched to the baton-active-directory connector via ExternalResourceMatch using the downlevel_logon_name key (i.e., the DOMAIN\GroupName format). The AD connector must be configured as a shared identity source.
  • Grant expansion — Each folder grant includes a GrantExpandable annotation pointing to the matched group’s member entitlement. This allows ConductorOne to expand group membership to see which individual users have access to each folder.
  • Built-in group filtering — Common built-in and administrative groups are automatically excluded (e.g., Administrators, Backup Operators, Guests, Users, Print Operators, and others). Groups from the BUILTIN\ and NT AUTHORITY\ domains are also excluded.
  • Inheritance handling — When skip-inherited is enabled (the default), the connector skips grants where the ACE is flagged as inherited or is a duplicate of a parent folder’s ACE. This reduces noise by only showing grants where permissions were explicitly assigned. The root folder is exempt from inheritance filtering.
  • Deduplication — When a group appears in multiple ACEs on the same folder, the connector keeps the highest-privilege entry (Read Write over Read Only) and prefers directly-assigned over inherited.
  • NULL DACLs — Folders with a NULL DACL (which grants full access to everyone) are skipped and produce no grants.

Folder discovery

The connector traverses the folder hierarchy starting from the configured share-path. With skip-inherited enabled (default), folders that have only inherited ACEs are skipped entirely — they won’t appear as resources. The max-folder-depth setting can limit traversal depth for large file shares.

Prerequisites

Unlike most connectors, baton-fileshare does not require API tokens or credentials. Instead, it reads the local filesystem directly to discover folders and their NTFS ACL permissions. Before setting up this connector, ensure:
  • baton-active-directory is configured as a shared identity source in ConductorOne. The file share connector discovers Active Directory groups in folder ACLs, and relies on the AD connector to match those groups and their members to ConductorOne identities.
  • A Windows account with file share access is available. The account running the connector must have:
    • Read access to the target file share path
    • Permission to read NTFS ACLs (security descriptors) on the folders within it
The baton-active-directory connector must be set up and configured as a shared identity source before setting up this connector. Without it, groups discovered in file share ACLs cannot be matched to users.

Configure the Windows File Share connector

To complete this task, you’ll need:
  • The Connector Administrator or Super Administrator role in ConductorOne
  • A Windows account with read access to the file share and NTFS ACLs
  • The baton-active-directory connector already configured as a shared identity source
Follow these instructions to use a built-in, no-code connector hosted by ConductorOne.Cloud-hosted connector not currently available.