Viewing Kerberos User Mappings

This section describes how to view the created mapping between Kerberos users and UNIX users.

Context

Procedure

  1. Choose Resources > Access > Authentication User > User Mappings > Kerberos to UNIX.
  2. Select an account from the Account drop-down list in the upper left corner.
  3. View the user mappings in the function pane. Table 1 describes related parameters.

    Table 1 User mapping parameters

    Parameter

    Description

    ID

    ID of a user mapping.

    Source User

    Source user in a mapping. The source user must be an uppercase client host name. If KDC Vendor is set to Windows, add $ as the suffix. Example, HOSTNAME$. If KDC Vendor is set to Non-Windows, add the domain name as the suffix. Example, HOSTNAME.example.com, where HOSTNAME is the uppercase client host name. Wildcard character * is supported. For example, * indicates all client hosts, and CLIENT* indicates hosts whose names start with CLINET.

    Target User

    Target user in a mapping.

    Mapping Mode

    Kerberos to UNIX: When accessing UNIX shares using Kerberos authentication through a client, a Kerberos user has all the permission granted to the target user.

    Priority

    When multiple mappings share the same source user, the system uses the mapping with the highest priority.

    NOTE:

    A smaller value indicates a higher priority.