Set the Kerberos-to-UNIX mapping for the NFS Kerberos service and set the mapping rule between the source and target users as required.
The Create User Mapping page is displayed on the right.
Table 1 describes related parameters.
Parameter |
Description |
|---|---|
Mapping Mode |
Kerberos to UNIX: When accessing UNIX shares using Kerberos authentication through a client, a Kerberos user has all the permission granted to the target user. |
Source User |
Source user in the mapping. The source user must be an uppercase client host name. If KDC Vendor is set to Windows, add $ as the suffix. Example, HOSTNAME$. If KDC Vendor is set to Non-Windows, add the domain name as the suffix. Example, HOSTNAME.example.com, where HOSTNAME is the uppercase client host name. Wildcard character * is supported. For example, * indicates all client hosts, and CLIENT* indicates hosts whose names start with CLINET.
NOTE:
In the scenario of accessing the audit log namespace, the source user cannot be the same as the local UNIX authentication user under the same account. |
Target User |
Target user in the mapping. The target user can be:
Set this parameter based on the permission requirements of the target user.
NOTE:
To access the audit log namespace, the target user must be a local UNIX authentication user whose ID is 0 with the root permission under the same account. |
Priority |
Priority of the mapping. A smaller value indicates a higher priority. When multiple mappings share the same source user, the system uses the mapping with the highest priority. [Value range] 1 to 32 |
You can set user mapping parameters and click Add to Mapping List to configure multiple user mappings.
Select a user mapping and click Test to check whether the target user in the user mapping exists.
You can also click More on the right of a desired user mapping and select Test.
The Modify User Mapping page is displayed on the right.
Table 1 describes related parameters.