6.3 HP StoreAll Storage File System User Guide (TA768-96093, June 2013)

Share Administrators. See “Windows Share Administrators” (page 71).
Summary. See “Summary” (page 71).
Active Directory
Enter your domain name, the Auth Proxy username (an AD domain user with privileges to join the
specified domain; typically a Domain Administrator), and the password for that user. These
credentials are used only to join the domain and do not persist on the cluster nodes.
NOTE: When you successfully configure Active Directory authentication, the machine is part of
the domain until you remove it from the domain, either with the ibrix_auth -n command or
with the Management Console. Because Active Directory authentication is a one-time event, it is
not necessary to update authentication if you change the proxy user information.
IMPORTANT: See “Linux static user mapping with Active Directory” (page 93) for information
about enabling Linux Static User Mapping. You can return to the wizard to modify settings if it is
not enabled at the first pass and is later required.
Linux static use mapping is optional. If you do not want to enable Linux Static User Mapping, leave
it set to the default value of None.
If you want to enable Linux Static User Mapping using Active Directory based ID Mapping set it
to Enabled with Active Directory.
If you want to use LDAP ID mapping as a secondary lookup for Active Directory, select Enabled
with LDAP ID Mapping and AD. When you click Next, the LDAP ID Mapping dialog box appears.
Configuring authentication from the GUI 65