Adaptec 5325301656 Administration Guide - Page 41

Support for Windows Network Authentication, Windows Networking Options, Kerberos Authentication

Page 41 highlights

Windows Networking Configuration still see these shares. To completely hide shares from visibility from any protocols, the Security > Shares screen gives you access to a separate and distinct Hidden share option that hides a share from SMB, AFP, HTTP, HTTPS, and FTP clients (However, shares are not hidden from NFS clients, which cannot connect to shares that aren't visible. To hide shares from NFS clients, consider disabling NFS access on hidden shares). For new shares, select New and click the Advanced button to access the Hidden share option. For existing shares, select the share, click Properties, and click Advanced to access the Hidden share option. Support for Windows Network Authentication This section summarizes important facts regarding the GuardianOS implementation of Windows network authentication. Windows Networking Options Windows networks use a domain controller to store user credentials. The domain controller can validate all authentication requests on behalf of other systems in the domain. Option Workgroup Domain (NT or ADS) Description In a workgroup environment, users and groups are stored and managed separately on each server in the workgroup. When operating in a Windows NT or Active Directory domain environment, the Snap Server is a member of the domain and the domain controller is the repository of all account information. Client machines are also members of the domain and users log into the domain through their Windows-based client machines. Windows or Active Directory domains resolve user authentication and group membership through the domain controller. Once joined to a Windows NT or Active Directory domain, the Snap Server imports and then maintains a current list of the users and groups on the domain. Thus, you must use the domain controller to make modifications to user or group accounts. Changes you make on the domain controller appear automatically on the Snap Server. Kerberos Authentication Kerberos is a secure method for authenticating a request for a service in a network. Kerberos lets a user request an encrypted "ticket" from an authentication process that can then be used to request a service from a server. The user credentials are always encrypted before they are transmitted over the network. The Snap Server supports the Microsoft Windows implementation of Kerberos. In Windows Active Directory (ADS), the domain controller is also the directory server, Chapter 2 Network Access to the Server 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224

Windows Networking Configuration
Chapter 2
Network Access to the Server
27
still see these shares. To completely hide shares from visibility from any protocols,
the
Security > Shares
screen gives you access to a separate and distinct Hidden
share option that hides a share from SMB, AFP, HTTP, HTTPS, and FTP clients
(However, shares are not hidden from NFS clients, which cannot connect to shares
that aren't visible. To hide shares from NFS clients, consider disabling NFS access
on hidden shares). For new shares, select
New
and click the
Advanced
button to
access the Hidden share option. For existing shares, select the share, click
Properties
, and click
Advanced
to access the Hidden share option.
Support for Windows Network Authentication
This section summarizes important facts regarding the GuardianOS
implementation of Windows network authentication.
Windows Networking Options
Windows networks use a domain controller to store user credentials. The domain
controller can validate all authentication requests on behalf of other systems in the
domain.
Kerberos Authentication
Kerberos is a secure method for authenticating a request for a service in a network.
Kerberos lets a user request an encrypted “ticket” from an authentication process
that can then be used to request a service from a server. The user credentials are
always encrypted before they are transmitted over the network.
The Snap Server supports the Microsoft Windows implementation of Kerberos. In
Windows Active Directory (ADS), the domain controller is also the directory server,
Option
Description
Workgroup
In a workgroup environment, users and groups are stored and
managed separately on each server in the workgroup.
Domain
(NT or ADS)
When operating in a Windows NT or Active Directory domain
environment, the Snap Server is a member of the domain and the
domain controller is the repository of all account information. Client
machines are also members of the domain and users log into the
domain through their Windows-based client machines. Windows or
Active Directory domains resolve user authentication and group
membership through the domain controller.
Once joined to a Windows NT or Active Directory domain, the Snap
Server imports and then maintains a current list of the users and
groups on the domain. Thus, you must use the domain controller to
make modifications to user or group accounts. Changes you make
on the domain controller appear automatically on the Snap Server.