<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CDot GIDs empty in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71417#M16652</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, maybe that would be the best approach. I thought about that too, but to be honest I really think that NetApp should start implementing this as a feature. If it was working on 7Mode I would expect it to work on CDot too. Worst part was having support looking into the issue and they really had no clue what wasn't working. So since we have the new Netapp, only thing we can use it for is NFS datastores for VMware. &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.netapp.com/5.0.1/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 21 Jul 2014 12:30:53 GMT</pubDate>
    <dc:creator>oweinmann</dc:creator>
    <dc:date>2014-07-21T12:30:53Z</dc:date>
    <item>
      <title>CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71378#M16636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm currently trying to migrate from 7Mode to CDot using 7MTT. After a few problems with 7MTT I'm now finally able to successfully initiate a cut over. After the cut over accessing files / folders with Unix security is not working as expected. If a user is not the owner of a file / folder he is not able to access it from windows using CIFS. I assume the problem is related to the filer not being able to pull the GIDs of a User from AD:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;secd authentication show-creds -node GEDASAN-02 -vserver Corporate -win-name tuser&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; UNIX UID: tuser &amp;lt;&amp;gt; Windows User: A\tuser (Domain User)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; GID: Domain Users&lt;/P&gt;&lt;P&gt; Supplementary GIDs: &amp;lt;None&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Windows Membership:&lt;/P&gt;&lt;P&gt;&amp;nbsp; A\Up ATEST De_Dt Da Lg (Alias)&lt;/P&gt;&lt;P&gt;&amp;nbsp; A\Up ATEST De_Dt Da Ug (Domain group)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; User is also a member of Everyone, Authenticated Users, and Network Users&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Privileges (0x80):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the 7MTT should have transferred my options.ldap but something seems to be missing for the GIDs...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2025 05:35:50 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71378#M16636</guid>
      <dc:creator>oweinmann</dc:creator>
      <dc:date>2025-06-05T05:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71383#M16638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you happen to ever get/discover an answer to this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm seeing the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using the AD-IDMU ldap client schema template (as I didn't make a copy and use it as "customiz-able")&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I seem to have other attributes and such mapping a-ok with AD user accounts.&amp;nbsp; Just not getting the gids.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jul 2014 18:26:56 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71383#M16638</guid>
      <dc:creator>bsnyder27</dc:creator>
      <dc:date>2014-07-14T18:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71388#M16641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes we got a very unsatisfying answer from NetApp saying that this is not implemented (yet???) in CDot. We had so many trobule moving from Cluster Mode to CDOT that we will consider to move away from NetApp.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jul 2014 08:55:04 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71388#M16641</guid>
      <dc:creator>oweinmann</dc:creator>
      <dc:date>2014-07-15T08:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71392#M16643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have just discovered how to make this happen for you if you're interested.&amp;nbsp; At least it appears to have worked for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming you have a similar setup to ours with leveraging AD, you need to take a look at the ldap client schema applied to your SVM 'Corporate'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are just using the AD-IDMU as-is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; vserver services ldap client show -vserver &lt;SPAN style="color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; background-color: #f8f8f8;"&gt;Corporate &lt;/SPAN&gt;-fields schema&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ## This will show you the LDAP schema applied to your SVM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; vserver services ldap client schema show -instance -vserver &lt;SPAN style="color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; background-color: #f8f8f8;"&gt;Corporate &lt;/SPAN&gt;-schema AD-IDMU&amp;nbsp;&amp;nbsp; ## prints out all of the fields showing you which AD attributes the schema is mapping to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The line to note from the second command is "RFC 2307 memberUid Attribute: &lt;STRONG&gt;memberUid&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The memberUid attribute was not populated for any of our groups and CDOT had no idea what auxiliary groups any of my domain users were a member of as a result...at least according to the '&lt;SPAN style="color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; background-color: #f8f8f8;"&gt;secd authentication show-creds&lt;/SPAN&gt;' command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have experienced most of our pain in permissions between unix and windows in our transition to CDOT and I will say that documentation on the matter is VERY scattered or lacking for a great portion of it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jul 2014 15:40:11 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71392#M16643</guid>
      <dc:creator>bsnyder27</dc:creator>
      <dc:date>2014-07-15T15:40:11Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71397#M16646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;bsnyder is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;memberUid is the way to do this presently.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Future releases will introduce RFC-2307bis schema support, which will allow extraction of GIDs in AD based on the "member" attributes, without needing memberUid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;oweinmann, please message me directly with any issues you have lingering and I will attempt to assist you the best I can. bsnyder27 can vouch for me. &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.netapp.com/5.0.1/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jul 2014 20:16:23 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71397#M16646</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-07-17T20:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71402#M16649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For reference, TR-4073 covers LDAP with cDOT in depth:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.netapp.com/us/media/tr-4073.pdf" title="http://www.netapp.com/us/media/tr-4073.pdf" target="_blank"&gt;http://www.netapp.com/us/media/tr-4073.pdf&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jul 2014 20:17:07 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71402#M16649</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-07-17T20:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71408#M16650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is what I get on our filer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;GEDASAN::&amp;gt; vserver services ldap client show -vserver Corporate -fields schema&amp;nbsp; vserver&amp;nbsp;&amp;nbsp; client-config&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/TD&gt;&lt;TD&gt;schema&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;--------- ----------------------------- ------------------------&lt;/P&gt;&lt;P&gt;Corporate LDAP_vfiler0_Corporate_conf_0 LDAP_vfiler0_Corporate_5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;GEDASAN::&amp;gt; vserver services ldap client schema show -instance -vserver Corporate -schema AD-IDMU&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vserver: Corporate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Schema Template: AD-IDMU&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Comment: Schema based on Active Directory Identity Management for UNIX (read-only)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 posixAccount Object Class: User&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 posixGroup Object Class: Group&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 nisNetgroup Object Class: nisNetgroup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 uid Attribute: uid&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 uidNumber Attribute: uidNumber&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 gidNumber Attribute: gidNumber&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 cn (for Groups) Attribute: cn&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 cn (for Netgroups) Attribute: name&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 userPassword Attribute: unixUserPassword&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 gecos Attribute: name&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 homeDirectory Attribute: unixHomeDirectory&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 loginShell Attribute: loginShell&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 memberUid Attribute: memberUid&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 memberNisNetgroup Attribute: memberNisNetgroup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RFC 2307 nisNetgroupTriple Attribute: nisNetgroupTriple&lt;/P&gt;&lt;P&gt;ONTAP Name Mapping windowsAccount Attribute: windowsAccount&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vserver Owns Schema: false&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And yes, memberUid is not set by default on Windows 2008 R2 Unix Identity Management. So how do you fix it? You write a script that populates the LDAP Attribute memberUid?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jul 2014 08:34:30 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71408#M16650</guid>
      <dc:creator>oweinmann</dc:creator>
      <dc:date>2014-07-21T08:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71413#M16651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That would be the best approach.&amp;nbsp; Should be easy to do with Powershell.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd provide you with a script if I had one, but we've just manually edited a small number of AD groups that needed this type of access for now which appears sufficient for us for now.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easy to test the outcome first by populating the memberUid attribute of one of you AD groups that tuser is a member of and rerunning your command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; background-color: #ffffff;"&gt;secd authentication show-creds -node GEDASAN-02 -vserver Corporate -win-name tuser&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jul 2014 12:22:01 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71413#M16651</guid>
      <dc:creator>bsnyder27</dc:creator>
      <dc:date>2014-07-21T12:22:01Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71417#M16652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, maybe that would be the best approach. I thought about that too, but to be honest I really think that NetApp should start implementing this as a feature. If it was working on 7Mode I would expect it to work on CDot too. Worst part was having support looking into the issue and they really had no clue what wasn't working. So since we have the new Netapp, only thing we can use it for is NFS datastores for VMware. &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.netapp.com/5.0.1/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jul 2014 12:30:53 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71417#M16652</guid>
      <dc:creator>oweinmann</dc:creator>
      <dc:date>2014-07-21T12:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71422#M16654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In TR-4073, I cover how to add "aux groups" to Windows LDAP. Basically, you double click the group and go to UNIX attributes. Then click "add" to add LDAP users. This populates the memberUid field in the schema.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.netapp.com/us/media/tr-4073.pdf" title="http://www.netapp.com/us/media/tr-4073.pdf" target="_blank"&gt;http://www.netapp.com/us/media/tr-4073.pdf&lt;/A&gt; page 83ish&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I mentioned previously "Future releases will introduce RFC-2307bis schema support." I cannot reveal which release on this forum, so you'd want to discuss with your sales rep under NDA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jul 2014 13:52:58 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71422#M16654</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-07-21T13:52:58Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71426#M16656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in the following KB article, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://kb.netapp.com/support/index?page=content&amp;amp;id=1012935" title="https://kb.netapp.com/support/index?page=content&amp;amp;id=1012935" target="_blank"&gt;https://kb.netapp.com/support/index?page=content&amp;amp;id=1012935&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which has a few copy &amp;amp; paste errors, and is basically misleading, it reads:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configuring a VServer for LDAP using Microsoft Windows Server 2003 R2, Windows Server 2008, and Windows Server 2008 R2 (Identity Management for UNIX):&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; The article claims that it should work fine as long as your are using IDMU and not Vintela or MS SFU. But this is not correct. I tried to set it up, but supplementary GIDs are empty. So hopefully this will be really fixed in the next 8.3 release.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what it says for Vintela and MS SFU:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; For secondary groups to work for mssfu35, once a group is UNIX-enabled, use a tool like ADSIEdit and modify the memberUid attribute of the group to add the username of the user to the group. ADUC cannot be used to complete this task.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Oliver&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Aug 2014 16:42:07 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71426#M16656</guid>
      <dc:creator>oweinmann</dc:creator>
      <dc:date>2014-08-27T16:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71431#M16657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Supplementary GIDs are empty likely because you do not have memberUid set in your LDAP schema.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The schema used for IDMU is a template in cDOT. It leverages the exact attributes used with Microsoft's IDMU implementation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vintela and MS SFU use very different schema attributes than IDMU, thus you would need to use different schema templates than IDMU. The vendor's recommendation would override whatever recommendation you see in KB or TR.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Supplementary GIDs work fine in cDOT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, this user has several supplementary GIDs (this was done on 8.2.1):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;::*&amp;gt; diag secd authentication show-creds -node ontaptme-rtp-01 -vserver parisi -unix-user-name test -list-id true -list-name true&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; UNIX UID: 10001 (test) &amp;lt;&amp;gt; Windows User: S-1-5-21-3413584004-3312044262-250399859-1251 (DOMAIN\test (Domain User))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; GID: 513 (Domain Users)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; Supplementary GIDs:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; 10011&amp;nbsp; (ldifde-group)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; 10012&amp;nbsp; (nested)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Windows Membership:&lt;/P&gt;&lt;P&gt;&amp;nbsp; S-1-5-21-3413584004-3312044262-250399859-1118&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DOMAIN\testgroup (Domain group)&lt;/P&gt;&lt;P&gt;&amp;nbsp; S-1-5-21-3413584004-3312044262-250399859-513&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DOMAIN\Domain Users (Domain group)&lt;/P&gt;&lt;P&gt;&amp;nbsp; S-1-5-32-545&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BUILTIN\Users (Alias)&lt;/P&gt;&lt;P&gt; User is also a member of Everyone, Authenticated Users, and Network Users&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Privileges (0x80):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the TR listed in this forum, I cover how to leverage supplemental groups in LDAP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.netapp.com/us/media/tr-4073.pdf" title="http://www.netapp.com/us/media/tr-4073.pdf" target="_blank"&gt;http://www.netapp.com/us/media/tr-4073.pdf&lt;/A&gt; page 83ish&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing needs to be fixed for 8.3 in this case; you just need to ensure the schema template is configured properly to query LDAP for the correct attributes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Aug 2014 17:39:44 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71431#M16657</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-08-27T17:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71437#M16658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, parisi, on a unix client is this or should this be reflected in a 'getent group' command?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; getent group nested&lt;SPAN style="color: #454545; background-color: #ffffff; font-family: Arial, Helvetica, Verdana, sans-serif;"&gt;&lt;STRONG&gt; - does this have user 'test' as a member given your above configuration? because ours does not&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #454545; background-color: #ffffff; font-family: Arial, Helvetica, Verdana, sans-serif;"&gt;&lt;SPAN style="color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; background-color: #ffffff;"&gt;Oliver&lt;/SPAN&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #454545; background-color: #ffffff; font-family: Arial, Helvetica, Verdana, sans-serif;"&gt;In our case, NFS honors the groups that get mapped through our SSSD config simply through typical AD group membership.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #454545; background-color: #ffffff; font-family: Arial, Helvetica, Verdana, sans-serif;"&gt;Windows access behavior is as parisi mentioned.&amp;nbsp; If user is member of an AD group set as Gid of the file/directory then access is denied, BUT populating the user in the memberUid attribute provisions the access needed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #454545; background-color: #ffffff; font-family: Arial, Helvetica, Verdana, sans-serif;"&gt;So accessing directory based off of Gid ownership by an AD group...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="color: #454545; background-color: #ffffff; font-family: Arial, Helvetica, Verdana, sans-serif;"&gt;&lt;STRONG&gt;from Windows (SMB)&lt;/STRONG&gt; - user must be in the &lt;STRONG&gt;memberUid &lt;/STRONG&gt;attribute of the AD group&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 10pt; line-height: 1.5em; background-color: #ffffff;"&gt;&lt;STRONG&gt;from Unix (NFSv3 or NFSv4)&lt;/STRONG&gt; - user needs to be member of the AD group (&lt;STRONG&gt;member&lt;/STRONG&gt; attribute) though we're leveraging SSSD against our AD.&amp;nbsp; Not certain if it comes into play for idmap, but I'm guessing it does based on the expected result of getent commands.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #454545; background-color: #ffffff; font-family: Arial, Helvetica, Verdana, sans-serif;"&gt;Hence, I was completely confused by this as I expected SMB access to reference the &lt;STRONG&gt;member &lt;/STRONG&gt;attribute and the UNIX access to reference the &lt;STRONG&gt;memberUid &lt;/STRONG&gt;attribute of the AD group.&amp;nbsp; It appears my logic was wrong.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 19:04:32 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71437#M16658</guid>
      <dc:creator>bsnyder27</dc:creator>
      <dc:date>2014-08-28T19:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71442#M16659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "member" attribute is a component of RFC-2307bis, which is not supported in cDOT yet. That support is coming in a future release. Until then, memberUid would need to be used.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 19:11:39 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71442#M16659</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-08-28T19:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71447#M16660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes memberUid is the only way to go currently. We use winbind instead of SSSD which can resolve user group memberships via RFC2307-bis. I will try to put together a script that automatically adds members of group to the memberUid attribute. Since we are using nested groups, and only assign GIDs to the local groups to not hit the NFS 16 group limit, this is not so easy but seems doable with Powershell and Quest AD cmdlets. Rumors say RFC2307-bis will be included in 8.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I discovered another Problem. Under 7mode we use the option "cifs.nfs_root_ignore_acl". This option is no longer available under Cdot. Problem is that the workaround proposed to us by NetApp imposes a security problem.We should set a username mapping for root =&amp;gt; DOMAIN\\Administrator and controll root access using access policies. I tested this, but unfortunately the usermapping overrules the export policy. So every root user on a linux system is mapped to DOMAIN\\Administrator and has full access to the nfs share. I don't know if that is by design, but this is a big problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2014 08:05:20 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71447#M16660</guid>
      <dc:creator>oweinmann</dc:creator>
      <dc:date>2014-08-29T08:05:20Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71452#M16661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I cannot confirm nor deny such rumors on this forum. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.netapp.com/5.0.1/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you contact a NetApp sales rep and get NDA, you can get this information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for cifs.nfs_root_ignore_acl, this is indeed a limitation and will be coming in a future release.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the use case for cifs.nfs_root_ignore_acl in your environment?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2014 14:03:11 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71452#M16661</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-08-29T14:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71458#M16662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.netapp.com/5.0.1/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a script that creates a folder structure on our filers. It sets owner and group under Unix and therefore needs root access. We have two machines on our network that are explicitely allowed Super User access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2014 14:15:12 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71458#M16662</guid>
      <dc:creator>oweinmann</dc:creator>
      <dc:date>2014-08-29T14:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71461#M16663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, one workaround would be to create a Windows user named "root" (or really, any other user) for the UNIX user "root" to map to. If using "root" as the Windows user, no need for name mapping rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then add that Windows user's ACL to the folders you need to modify. That way, root is not "administrator" across the board and you can control access through ACLs until the option is added to cDOT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2014 14:20:27 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71461#M16663</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-08-29T14:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71465#M16664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, this is a bit better but at the end you have all machines root accounts having the same access level (which is full) in this case. Only a handful of users have root access but still not a good solution in terms of security. I guess at the moment we will have to wait for the next release. I have now put together a powershell script that automatically adds the members to the memberuid attribute. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.netapp.com/5.0.1/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2014 14:25:48 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71465#M16664</guid>
      <dc:creator>oweinmann</dc:creator>
      <dc:date>2014-08-29T14:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: CDot GIDs empty</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71471#M16665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, with the export policy rules, you control whether those clients can access the mount at all via client match. If the clients are not in the rule list, they don't get access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still desire access to these clients and are trying to "squash" root to anon, you wouldn't be able to do this, as the mapping would take precedence and the NTFS ACL controls access, not the mode bit. You could always create different Windows users for these "real" root accounts to avoid the scenario, but then you'd just be going down the rabbit hole.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully your supplementary GIDs are showing up for you now that you have added the memberUid. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.netapp.com/5.0.1/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2014 14:34:17 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CDot-GIDs-empty/m-p/71471#M16665</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2014-08-29T14:34:17Z</dc:date>
    </item>
  </channel>
</rss>

