Administrator Guide

Table Of Contents
To add a NIS server, type the host name or IP address of a NIS server in the NIS Servers text field and click Add.
To remove a NIS server, select an NIS server and click Remove.
7. Click OK.
Change the Order of Preference for NIS Servers
If the FluidFS cluster cannot establish contact with the preferred server, it will attempt to connect to the remaining servers in
order.
Steps
1. In the Storage view, select a FluidFS cluster.
2. Click the File System tab.
3. In the File System view, select Client Accessibility.
4. Click the Directory Services tab.
5. Click Edit Settings in the NFS User Repository section. The Edit External User Database dialog box opens.
6. NIS servers are listed in descending order of preference:
To increase the order of preference for a NIS server, select a NIS server and click Up.
To decrease the order of preference for a NIS server, select a NIS server and click Down.
7. Click OK.
Managing User Mappings Between Windows and UNIX/Linux Users
You can define mappings between Windows users in Active Directory and UNIX/Linux users in LDAP or NIS. The mapping
ensures that a Windows user inherits the UNIX/Linux user permissions and a UNIX/Linux user inherits the Windows user
permissions, depending on the direction of the mapping and the NAS volume security style.
User Mapping Policies
The user mapping policies include automatic mapping and mapping rules.
Automatic mapping Automatically map all Windows users in Active Directory to the identical UNIX/Linux users in LDAP
or NIS, and map all UNIX/Linux users to the identical Windows users. Automatic mapping is disabled by default.
Mapping rules Define mappings between specific Windows users in Active Directory and the identical UNIX/Linux users
in LDAP or NIS. These specific mapping rules take precedence over automatic mapping. You can select the direction of the
mapping, which can go in one direction or both.
Mapping is allowed in one direction:
Windows user to a UNIX/Linux user
UNIX/Linux user to a Windows user
Mapping is allowed in both directions between a Windows user and a UNIX/Linux user.
User Mapping Policy and NAS Volume Security Style
User mapping permissions depend on the file security style for the NAS volume:
NTFS security style Permissions are controlled by Windows and NTFS. The UNIX/Linux user will adhere to the
permissions of the corresponding Windows user, regardless of the UNIX/Linux permission settings.
UNIX security style Permissions are based on the UNIX/Linux permissions. The Windows user will adhere to the
permissions of the corresponding UNIX/Linux user.
Mixed security style Both UNIX/Linux and Windows permissions are used. Each user can override the other user's
permission settings; therefore, be careful when using the Mixed security style.
FluidFS Administration
385