This section describes how to modify the mapping mode, source user, target user, priority of a user mapping. The new user mapping can be used to access shares.
The Modify User Mapping page is displayed on the right.
Table 1 describes related parameters.
Parameter |
Description |
|---|---|
Mapping Mode |
Kerberos to UNIX: When accessing UNIX shares using Kerberos authentication through a client, a Kerberos user has all the permission granted to the target user. |
Source User |
Indicates the source user in the mapping. The source user must be a uppercase client host name. If KDC Vendor is set to Windows, add $ as the suffix. Example, HOSTNAME$. If KDC Vendor is set to Non-Windows, add the domain name as the suffix. Example, HOSTNAME.example.com, where HOSTNAME is the uppercase client host name. Wildcard character * is supported. For example, * indicates all client hosts, and CLIENT* indicates hosts whose names start with CLINET. |
Target User |
Indicates the target user in the mapping. The target user can be:
Set this parameter based on the permission requirements of the target user. |
Priority |
Indicates the priority of the mapping. A smaller value indicates a higher priority. When multiple mappings share the same source user, the system uses the mapping with the highest priority. [Value range] 1 to 32 |