This section describes how to view the created mapping between Kerberos users and UNIX users.
to refresh user mapping information.
next to a parameter and enter a keyword to search for the required user mapping information.
to select the user mapping parameters you want to view.
or
next to a parameter to change the display order of user mappings.Parameter |
Description |
|---|---|
ID |
Indicates the ID of a user mapping. |
Source User |
Indicates the source user in the mapping. The source user must be a uppercase client host name. If KDC Vendor is set to Windows, add $ as the suffix. Example, HOSTNAME$. If KDC Vendor is set to Non-Windows, add the domain name as the suffix. Example, HOSTNAME.example.com, where HOSTNAME is the uppercase client host name. Wildcard character * is supported. For example, * indicates all client hosts, and CLIENT* indicates hosts whose names start with CLINET. |
Target User |
Indicates the target user in the mapping. |
Mapping Mode |
Kerberos to UNIX: When accessing UNIX shares using Kerberos authentication through a client, a Kerberos user has all the permission granted to the target user. |
Priority |
When multiple mappings share the same source user, the system uses the mapping with the highest priority.
NOTE:
A smaller value indicates a higher priority. |