EasyManua.ls Logo

Fujitsu ETERNUS DX S5 Series - Figure 90 Process for Acquiring the Authentication Information (CIFS)

Fujitsu ETERNUS DX S5 Series
335 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
โ– 
Authentication in Environments where the CIFS Protocol and the NFS Protocol Are Used
Concurrently
In environments where the CIFS protocol and the NFS protocol are used concurrently and Active Directory (AD)
authentication and LDAP authentication are used, operational design for authentication information
(username, group name, and ID) is required.
โ— Process of Acquiring the Authentication Information during a Switchover from AD Authentication to LDAP
Authentication
โ€ข CIFS access
For CIFS access, AD authentication is performed.
Therefore, attempts to access directories or files from a user not registered in the AD authentication server
result in an authentication error.
Figure 90 Process for Acquiring the Authentication Information (CIFS)
ETERNUS DX
LAN
NFSCIFS
Active Directory authentication server
LDAP authentication server
2. Authenticate the access
Request access to the
shared folder
1.
3. Respond to the
access request
Windows client
UNIX / Linux client
Shared folder A Shared folder B
โ€ข NFS access
For NFS access, confirmation of the access permissions is performed.
The ETERNUS DX initially accesses the AD authentication server to reference the authentication
information.
If the AD authentication server lacks the authentication information, the LDAP authentication server is
accessed.
If the authentication information is not registered in the AD authentication server or the LDAP
authentication server, the access results in an authentication error.
4. NAS Functions
User Management
177 Design Guide

Table of Contents

Other manuals for Fujitsu ETERNUS DX S5 Series

Related product manuals