Configuring authentication and ID mapping for file access
The system administrator can decide whether to configure authentication and ID mapping method either during the installation of the IBM Storage Scale system or after the installation. If the authentication configuration is not configured during installation, you can manually do it by using the mmuserauth service create command from any protocol node of the IBM Storage Scale system or by using the IBM Storage Scale management GUI.