Figure 90 Process For Acquiring The Authentication Information (Cifs) - Fujitsu ETERNUS DX S5 Series Design Manual

Hybrid
Hide thumbs Also See for ETERNUS DX S5 Series:
Table of Contents

Advertisement

4. NAS Functions
User Management
Authentication in Environments where the CIFS Protocol and the NFS Protocol Are Used
Concurrently
In environments where the CIFS protocol and the NFS protocol are used concurrently and Active Directory (AD)
authentication and LDAP authentication are used, operational design for authentication information
(username, group name, and ID) is required.
Process of Acquiring the Authentication Information during a Switchover from AD Authentication to LDAP
Authentication
CIFS access
For CIFS access, AD authentication is performed.
Therefore, attempts to access directories or files from a user not registered in the AD authentication server
result in an authentication error.
Figure 90
Active Directory authentication server
1.
Request access to the
shared folder
Windows client
NFS access
For NFS access, confirmation of the access permissions is performed.
The ETERNUS DX initially accesses the AD authentication server to reference the authentication
information.
If the AD authentication server lacks the authentication information, the LDAP authentication server is
accessed.
If the authentication information is not registered in the AD authentication server or the LDAP
authentication server, the access results in an authentication error.
Process for Acquiring the Authentication Information (CIFS)
2. Authenticate the access
CIFS
Shared folder A
3. Respond to the
access request
LDAP authentication server
NFS
Shared folder B
ETERNUS DX
177
LAN
UNIX / Linux client
Design Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents