This section describes how to modify the mapping mode, source user, target user, priority of a user mapping. The new user mapping can be used to access shares.
The Modify User Mapping page is displayed on the right.
Table 1 describes related parameters.
Parameter |
Description |
|---|---|
Mapping Mode |
Kerberos to UNIX: When accessing UNIX shares using Kerberos authentication through a client, a Kerberos user has all the permission granted to the target user. |
Source User |
Source user in a mapping. The source user must be an uppercase client host name. If KDC Vendor is set to Windows, add $ as the suffix. Example, HOSTNAME$. If KDC Vendor is set to Non-Windows, add the domain name as the suffix. Example, HOSTNAME.example.com, where HOSTNAME is the uppercase client host name. Wildcard (*) is supported. For example, * indicates all client hosts, and CLIENT* indicates hosts whose names start with CLINET. |
Target User |
Target user in a mapping. The target user can be:
Set this parameter based on the permission requirements of the target user. |
Priority |
Priority of a mapping. A smaller value indicates a higher priority. When multiple mappings share the same source user, the system uses the mapping with the highest priority. [Value range] 1~32 |