30 OES 2: Novell iFolder 3.6 Cross-Platform User Guidenovdocx (en) 11 July 20083.4.3 Shared iFoldersFor your enterprise server account, you can share iFolders only with other users who also have anaccount on the same enterprise server. Contact your system administrator if you need to shareiFolders with a user or group of users who are not yet provisioned for services on that server.The server hosts every iFolder created for that account. When you create an iFolder, the enterpriseserver makes it available to the specified list of users.3.4.4 iFolder Access RightsWhen you use the iFolder client with iFolder 3.6, the administrator can provide the followingsupport services: Transfer ownership of an iFolder to any user on the iFolder server, even if the user is notcurrently a member of the iFolder. Modify the access right for a member. Set a disk quota policy that restricts the amount of disk space that a user can consume for his orher iFolders. The policy can apply system-wide for all users or be set for an individual user.To view the disk quota setting for your account, see Section 6.4, “Viewing and ModifyingiFolder Account Settings,” on page 58 after you set up your enterprise server account. If an owner user is deleted as a user for the iFolder enterprise server, the iFolders owned by theuser are orphaned. Orphaned iFolders are assigned temporarily to the iFolder administrator,who serves as a temporary custodial owner. Membership and synchronization continues whilethe iFolder administrator determines whether an orphaned iFolder should be deleted orassigned to a new owner.3.4.5 Encryption Policy SettingsiFolder 3.6 provide higher security for your sensitive files. With encryption policy set to On, allyour iFolder files are transferred and stored encrypted on the iFolder enterprise server. Your iFolderAdmin determines the encryption policy for your iFolders. If encryption is enabled, You will havethe option to choose between encrypted and Shared. If you choose the former, the data is encryptedwith your secret passphrase as it travels across the wire and stored on the iFolder server. For moreinformation, see Section 7.10, “Managing Passphrase for Encrypted iFolders,” on page 85.3.4.6 Security SettingsWhenever iFolder connects to an enterprise server to synchronize files, it connects with HTTP orconnections to the server, and the server authenticates the user against its LDAP directory service.Your iFolder administrator determines whether iFolder traffic uses HTTP based iFolder settings.Ifthere is no policy settings to set, one can choose HTTP from the client policy settings.You might need to configure the following settings on your local computer to accommodate thistraffic: Section 6.6, “Configuring Local Firewall Settings for iFolder Traffic,” on page 64 Section 6.7, “Configuring Local Virus Scanner Settings for iFolder Traffic,” on page 66