Network and Storage Protocols
Network and Storage Protocols
Hi all,
Sorry if this is going to be an obvious answer but I’m having a few difficulties in understanding the permissions within clustered mode.
I’m just trying to clarify something with regards to security at volume level. If I set up vol1 with Unix style security (all permissions eg read/write and so on) and vol2 with NTFS security (again all permission), if I set up user mappings (windows to unix and unix to windows), essentially the security style doesn’t matter as my windows mapped account can still access vol1 (unix) and my unix account can still access vol2 (ntfs security)…
Is that correct?
Thanks
Aaron
Solved! See The Solution
Yes, you're right and I should have spelled that out instead of making the assumtion. I shoud have really said something like - provided your AD username match up to your Unix usernames provided through NIS/LDAP etc...
--rdp
It is true that both systems will be able to access data on both volumes (assuming you have licenses for both protocols and both are configured) provided your user mapping is correct. Just keep in mind that the unix volume will always have unix permissions and the NTFS volume will have windows permissions setup. You can't add NT ACLs to the unix partition etc...
Note that by default the filer will map usernames that match on both systems so you only need usermap entries when they don't match.
--rdp
Yes, you're right and I should have spelled that out instead of making the assumtion. I shoud have really said something like - provided your AD username match up to your Unix usernames provided through NIS/LDAP etc...
--rdp
If a smaller environment many use /etc/passwd (7-Mode) or unix-user create (cDOT) if they don't have ldap or nis for name to id mapping.