Adaptec 5325301656 Administration Guide - Page 100

ID Mapping

Page 100 highlights

ID Mapping Function SnapTree File System Permissions Toggling Security Models Mixing SnapTrees Description Security model and permissions differ according to the method used to create the SnapTree directory: • From the client: If SMB, permissions will either be according to ACL inheritance (if the parent volume root directory has the Windows security model) or Full Access to the owning user only. Permissions for directories created by all other protocols will be set by the client (per the client's umask). • From the Administration Tool: If created in a UNIX volume, permissions will be 777 (rwx/wx/wx). If created in a Windows/Mixed volume, permissions will allow all users to create, delete, and change permissions on files created inside the SnapTree, and will grant full control to administrators. Changes to a SnapTree's security model can optionally be propagated to the corresponding personality with a default permission to all files and directories underneath the SnapTree. When changing the security model on a SnapTree: • If changing from Windows to UNIX, all files and directories will be changed to be owned by admin and admingrp, with UNIX permissions of 777(rwxrwxrwx). • If changing from UNIX to Windows, files and directories will be changed to default permissions that allow all users the ability to create and manage their own files and directories and to access other users' files and directories. You can create SnapTrees of different security models on the same volume. ID Mapping ID mapping allows users and groups that exist on Windows domains to share user IDs with local or NIS users and groups. This results in the same permissions and quota consumption applying to both the Windows domain user and the local or NIS user. Example: John Smith is a local user on a Snap Server, as well as having a user ID on a Windows domain. John's quota for the Snap Server has been set to 200 MB. The administrator of the Snap Server maps the Windows domain user identification for John Smith to the local identification for John Smith, giving both IDs access to John's 200 MB. Note Search filters without wildcards will search for all entries containing the string you enter in the search field rather than looking for exact matches. For 86 Snap Server Administrator Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224

ID Mapping
86
Snap Server Administrator Guide
ID Mapping
ID mapping allows users and groups that exist on Windows domains to share user
IDs with local or NIS users and groups. This results in the same permissions and
quota consumption applying to both the Windows domain user and the local or NIS
user. Example:
John Smith is a local user on a Snap Server, as well as having a user ID on a
Windows domain. John’s quota for the Snap Server has been set to 200 MB. The
administrator of the Snap Server maps the Windows domain user identification
for John Smith to the local identification for John Smith, giving both IDs access to
John’s 200 MB.
Note
Search filters without wildcards will search for all entries containing the
string you enter in the search field rather than looking for exact matches. For
SnapTree File
System
Permissions
Security model and permissions differ according to the method used to
create the SnapTree directory:
From the client: If SMB, permissions will either be according to ACL
inheritance (if the parent volume root directory has the Windows
security model) or
Full Access
to the owning user only. Permissions for
directories created by all other protocols will be set by the client (per
the client’s umask).
From the Administration Tool: If created in a UNIX volume, permissions
will be
777
(rwx/wx/wx). If created in a Windows/Mixed volume,
permissions will allow all users to create, delete, and change
permissions on files created inside the SnapTree, and will grant full
control to administrators.
Toggling
Security
Models
Changes to a SnapTree’s security model can optionally be propagated to
the corresponding personality with a default permission to all files and
directories underneath the SnapTree.
When changing the security model on a SnapTree:
If changing from Windows to UNIX, all files and directories will be
changed to be owned by
admin
and
admingrp
, with UNIX permissions
of 777(rwxrwxrwx).
If changing from UNIX to Windows, files and directories will be
changed to default permissions that allow all users the ability to create
and manage their own files and directories and to access other users’
files and directories.
Mixing
SnapTrees
You can create SnapTrees of different security models on the same
volume.
Function
Description