Configuring file authentication by using GUI
You can configure an authentication method or view the existing authentication method that is used for Network File System (NFS) and Server Message Block (SMB) users from the
page of the GUI.The IBM Storage Scale system supports the following
file user authentication methods to authenticate an NFS or SMB user:
- Active Directory
- Uses Microsoft Active Directory (AD) as the authentication server. This method is used if you need to authenticate SMB users to access the data through SMB shares. When you select AD as the authentication server, you need to configure an ID-mapping method to map the user IDs from the external domain with a set of internal user IDs. You can configure the following ID-mapping methods: Automatic ID mapping, RFC2307 ID mapping, and LDAP ID mapping. The details of these ID-mapping methods are explained in the procedure.
- LDAP
- Uses an LDAP server to authenticate users. This is the ideal method to authenticate the NFS protocol users to access the data through the NFS exports.
- NIS
- The NIS-based authentication is useful in NFS-only environment where NIS acts as an ID-mapping
server and used for net groups. When file access is configured with NIS, SMB access cannot be
enabled.Note: NIS authentication is not supported for RHEL 9.
- User-defined
- The user can select the authentication and ID-mapping methods of their choice. It is the responsibility of the administrator of the client system to manage the authentication and ID mapping for file access to the IBM Storage Scale system.
Example for how to configure file authentication by using GUI
The following steps show how to configure an Active Directory-based file authentication method by using GUI:
Viewing, modifying, or deleting the file authentication configuration
You can also perform the following tasks from the
page in the GUI.- View the existing configuration. The existing authentication is specified under the Settings tab.
- Modify the existing authentication configuration.
- Delete the existing configuration and ID mappings, if any.