Adaptec 5325301507 Administration Guide - Page 47

Kerberos Authentication, Interoperability with Active Directory Authentication

Page 47 highlights

Windows Networking Configuration Kerberos Authentication Kerberos is a secure method for authenticating a request for a service in a network. Kerberos lets a user request an encrypted "ticket" from an authentication process that can then be used to request a service from a server. The user credentials are always encrypted before they are transmitted over the network. The SnapServer supports the Microsoft Windows implementation of Kerberos. In Windows Active Directory (ADS), the domain controller is also the directory server, the Kerberos key distribution center (KDC), and the origin of group policies that are applied to the domain. Notes Kerberos requires the server's time to be closely synchronized to the domain controller's time. This means that (1) the server automatically synchronizes its time to the domain controller's and (2) NTP cannot be enabled when joined to an ADS domain. Interoperability with Active Directory Authentication The SnapServer supports the Microsoft Windows 2000/2003/2008 family of servers that run in native ADS mode or in mixed NT/ADS mode. SnapServers can join Active Directory domains as member servers. References to the SnapServer's shares can be added to organizational units (OU) as shared folder objects. Note Windows 2000 domain controllers must run SP2 or later. Guest Account Access to the SnapServer The Security > Local Users screen contains an option that allows unknown users to access the SnapServer using the guest account. Restrict_Anonymous and PDC Access If you have implemented the restrict_anonymous mechanism on your domain, you may need to enter a valid domain (not local) user name and password that the SnapServer can use to communicate with the PDC. For ease of administration, Overland Storage recommends that you create a unique user account on the domain using the following guidelines: • Choose a name, such as SnapServerAccess, and include a comment that makes the function of the account clear. • Set the password to never expire. Note A restrict_anonymous user account does not require administrative access. Chapter 2 Network Access to the Server 31

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250

Windows Networking Configuration
Chapter 2
Network Access to the Server
31
Kerberos Authentication
Kerberos is a secure method for authenticating a request for a service in a network.
Kerberos lets a user request an encrypted “ticket” from an authentication process
that can then be used to request a service from a server. The user credentials are
always encrypted before they are transmitted over the network.
The SnapServer supports the Microsoft Windows implementation of Kerberos. In
Windows Active Directory (ADS), the domain controller is also the directory server,
the Kerberos key distribution center (KDC), and the origin of group policies that are
applied to the domain.
Notes
Kerberos requires the server's time to be closely synchronized to the domain
controller’s time. This means that (1) the server automatically synchronizes its time
to the domain controller's and (2) NTP cannot be enabled when joined to an ADS
domain.
Interoperability with Active Directory Authentication
The SnapServer supports the Microsoft Windows 2000/2003/2008 family of servers
that run in native ADS mode or in mixed NT/ADS mode. SnapServers can join
Active Directory domains as member servers. References to the SnapServer's shares
can be added to organizational units (OU) as shared folder objects.
Note
Windows 2000 domain controllers must run SP2 or later.
Guest Account Access to the SnapServer
The
Security > Local Users
screen contains an option that allows unknown users to
access the SnapServer using the guest account.
Restrict_Anonymous and PDC Access
If you have implemented the
restrict_anonymous
mechanism on your domain, you
may need to enter a valid domain (not local) user name and password that the
SnapServer can use to communicate with the PDC. For ease of administration,
Overland Storage recommends that you create a unique user account on the domain
using the following guidelines:
Choose a name, such as
SnapServerAccess
, and include a comment that makes the
function of the account clear.
Set the password to never expire.
Note
A
restrict_anonymous
user account does not require administrative access.