Installation manual

Preparing for CIFS Authentication
Adding a Proxy User
3-4 CLI Storage-Management Guide
Specifying the Username and Password
The final step in configuring a proxy user is to specify a username and password. This
username/password must belong to the Backup Operators group to ensure that it has
sufficient authority to move files freely from share to share.
From gbl-proxy-user mode, use the
user command to specify the username:
user username
where username (1-64 characters) is a valid username in the proxy-users
domain.
The CLI prompts you for the users password, then prompts to validate the password.
For example, the following command sequence specifies the username, “jqpublic:”
bstnA6k(gbl-proxy-user[acoProxy2])# user jqpublic
Password: jqpasswd
Validate Password: jqpasswd
bstnA6k(gbl-proxy-user[acoProxy2])# ...
Removing the Username and Password
Removing the username from the proxy-user configuration effectively disables the
proxy user. From gbl-proxy-user mode, use
no user to remove the username:
no user
For example:
bstnA6k(gbl)# proxy-user testuser
bstnA6k(gbl-proxy-user[testuser])# no user
bstnA6k(gbl-proxy-user[testuser])# ...
This applies to all back-end filers and shares; a user can be defined as part of the Backup
Operators group on one CIFS filer but not on another.