Docu48462 - Using Ntxmap For CIFS User Mapping On VNX 8.1
Docu48462 - Using Ntxmap For CIFS User Mapping On VNX 8.1
Release 8.1
EMC Corporation
Corporate Headquarters:
Hopkinton, MA 01748-9103
1-508-435-1000
www.EMC.com
Copyright © 1998 - 2013 EMC Corporation. All rights reserved.
Published August 2013
EMC believes the information in this publication is accurate as of its publication date. The
information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION
MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO
THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an
applicable software license.
For the most up-to-date regulatory document for your product line, go to the Technical
Documentation and Advisories section on EMC Powerlink.
For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on
EMC.com.
All other trademarks used herein are the property of their respective owners.
Corporate Headquarters: Hopkinton, MA 01748-9103
Preface.....................................................................................................5
Chapter 1: Introduction...........................................................................7
System requirements...............................................................................................8
Restrictions...............................................................................................................8
User interface choices.............................................................................................9
Related information................................................................................................9
Chapter 2: Concepts.............................................................................11
ntxmap mapping methods...................................................................................12
Windows credential mapping...................................................................12
UNIX-to-Windows mapping.....................................................................13
Windows user mapping rule...............................................................................14
ntxmap bidirectional mapping — Examples...........................................15
Secure mapping and ntxmap...............................................................................15
Configuring ntxmap for Windows user mapping............................................15
Chapter 3: Configuring.........................................................................17
Create the ntxmap.conf file..................................................................................18
Modify the ntxmap.conf file................................................................................19
Chapter 4: Managing............................................................................21
Verify the ntxmap.conf file...................................................................................22
Verify the CIFS configuration..............................................................................22
Verify the ntxmap mappings...............................................................................24
Disable ntxmap .....................................................................................................26
Chapter 5: Troubleshooting..................................................................27
EMC E-Lab Interoperability Navigator..............................................................28
Error messages.......................................................................................................28
EMC Training and Professional Services...........................................................28
Glossary..................................................................................................31
Index.......................................................................................................35
As part of an effort to improve and enhance the performance and capabilities of its product lines,
EMC periodically releases revisions of its hardware and software. Therefore, some functions described
in this document may not be supported by all versions of the software or hardware currently in use.
For the most up-to-date information on product features, refer to your product release notes.
If a product does not function properly or does not function as described in this document, please
contact your EMC representative.
Note: Emphasizes content that is of exceptional importance or interest but does not relate to personal
injury or business/data loss.
Indicates a hazardous situation which, if not avoided, will result in death or serious
injury.
Note: Do not request a specific support representative unless one has already been assigned to
your particular system problem.
Your comments
Your suggestions will help us continue to improve the accuracy, organization, and overall
quality of the user publications.
Please send your opinion of this document to:
Introduction
System requirements
Table 1 on page 8 describes the EMC® VNX® software, hardware, network, and storage
configurations.
◆ Windows NT domains:
NT Lan Manager (NTLM)
WINS
Storage Follow the procedures in Managing a Multiprotocol Environment on VNX to configure the
VNX storage requirements.The ntcred mount option should be set to use the NT credential
cache. Ensure that the security mode for CIFS is not set to UNIX or SHARE on the Data
Mover. Verify that sufficient space is available in the root file system. Contact your EMC
Customer Support Representative for assistance with determining size requirements.
Restrictions
The ntxmap.conf file is a text file that is sequentially parsed for every mapping request. If
the mapping entries exceed 1,000, EMC recommends that you do not use ntxmap. More
than 1,000 user mapping entries can lead to authentication latency issues, and potentially
impact the Windows user login and work sessions.
Related information
For additional information related to the features and functionality described in this
document:
VNX wizards
Unisphere software provides wizards for performing setup and configuration tasks. The
Unisphere online help provides more details on the wizards.
Concepts
Note: In a multiprotocol environment, ntxmap is used only for users who cannot
be mapped by using another user mapping method. A typical VNX configuration
might include a few users who are mapped by using the ntxmap.conf file, and
others who are mapped by using another user mapping method appropriate for
that configuration.
Note: If the ntxmap.conf file does not exist or is unable to provide a mapping, the Data Mover then
uses the user mapping method configured for its environment.
Note: A mapped name is found if the domain and Windows username match the domain and
username in a mapping entry created in the ntxmap.conf file. The domain name must be the
NETBIOS domain name, in uppercase. If the domain in the mapping rule is empty or is specified
as "*", any user domain is valid. The username is not case-sensitive for mapping. However, the
UNIX name is case-sensitive. The first entry that matches the mapping is used.
3. If a mapped UNIX name is available, the Data Mover uses the user mapping method
configured for its environment to search for a UID and GIDs that correspond to the
mapped name.
4. In addition, if the Windows acl.extendExtraGid parameter is set, the Windows user
groups are merged with the UNIX secondary groups and added to the list of GIDs in the
Windows credentials.
Example scenario
This example shows how Windows credentials mapping works. The ntxmap.conf file
contains this mapping rule:
INTGW2K3:WINuser:=:UNIXuser
When the user WINuser of domain INTGW2K3 logs in to the Data Mover, the Windows
credential contains the SID, UID, and GIDs associated with UNIXuser. The UID and
GIDs are retrieved by using the user mapping method configured for that environment.
Each time the user uses a resource, access is granted by checking the user access rights
(SID, UID, and GIDs) against the resource’s access rights.
Note: Configuring VNX User Mapping provides information on the user mapping methods best
suited for your VNX environment.
UNIX-to-Windows mapping
Note: In UNIX-to-Windows mapping methods, the SID is retrieved from the UNIX UID.
Typically, the Data Mover searches for a UNIX username. The domain name is added to
the UNIX name and the domain controller is requested to provide the corresponding SID.
In UNIX to Windows mapping, the ntxmap.conf mapping file provides the domain and
username.
When a UNIX user logs in and requests a Windows resource:
1. The UNIX authentication procedure provides the UID and GIDs for the UNIX username.
2. The Data Mover uses the UID-to-UNIX name resolution mechanism to get the UNIX
name.
3. With the UNIX name provided, the Data Mover queries the ntxmap.conf file for a mapped
Windows NT name and its domain name. A mapped Windows NT name is found if the
UNIX name in the mapping entry matches the UNIX name (case-sensitive) of the user.
4. Using the mapped Windows name, the Data Mover queries the domain controller for
the corresponding SID mapping.
Note: If the domain name is empty, the default domain name of the Data Mover is used to query
the domain controller.
5. The retrieved UID and SID are used to grant access to the resources.
6. In addition, if the Windows acl.extendExtraGid parameter is set, the Windows user
groups are merged with the UNIX secondary groups, and added to the list of GIDs for
the UNIX user. The UID, the SIDs, and the GIDs for this user are then cached locally,
and are used for subsequent requests. Each mapping entry in the cache has an expiry
period. When the expiry period is over, the entry is automatically deleted.
Example scenario
This mapping rule explains how the UNIX to Windows mapping works. The ntxmap.conf
file contains this:
INTGW2K3:WINuser:=:UNIXuser
When the user UNIXuser requests resources, SIDs of the user WINuser of domain
INTGW2K3 are mapped to the UNIX user’s UID. Each time the user uses a resource,
access is granted by checking the user access rights (SID, UID, and GIDs) against the
resource’s access rights.
Note: Configuring VNX User Mapping provides information on the user mapping methods best
suited for your VNX environment.
Note: Usernames contain non-alphanumeric characters. "=xx" is used to set a character by its hexadecimal
ASCII value. "==xxxx" is used to set a character by its hexadecimal Unicode value. This helps when
storing non-ASCII names.
Note: Comments are allowed in the ntxmap.conf file. A comment line starts with "#".
Rules Examples
A Windows user with a domain name INTGW2K3:user1:=:unixname1
Configuring
where:
domain = the user's domain; it refers to the NetBIOS name, and is case-sensitive
Note: Empty domain names are allowed, and only user is checked for the mapping match. A domain value
of "*" is equivalent to an empty domain.
direction = how the rule applies; the sign "=" indicates a bidirectional mapping, that is, valid for mapping
from Windows to UNIX and from UNIX to Windows
unix_name = UNIX name of the user
Note: The rule syntax for a domain, user, and unix_name includes: ASCII characters, blank characters, and
Unicode characters. Any special ASCII character can be used by using the "=xx" format, where xx is the ASCII
value of the character in hexadecimal. A blank character is a special character. Any Unicode character can
be used by using the "==xxxx" format, where xxxx is the hexadecimal value for the Unicode character.
Note: Domains and usernames are case-insensitive. "*" for domain means any domain is valid. A "#" character
at the beginning of the line is a comment. A comment can be added at the end of the line by using "#" followed
by the comment.
ntxmap bidirectional mapping — Examples on page 15 provides more information on bidirectional mappings.
Step Action
3 Copy the ntxmap.conf file from the Control Station to the Data Mover by using this command syntax:
$ server_file <movername> -put ntxmap.conf ntxmap.conf
where:
<movername> = name of the Data Mover on which the file is to be copied
Example:
To copy the ntxmap.conf file from the Control Station to the Data Mover, type:
$ server_file server_2 -put ntxmap.conf ntxmap.conf
Output:
server_2: done
Note: The modified ntxmap.conf file is used automatically after it is placed in the /.etc directory of the Data
Mover’s root file system.
Example:
To copy the ntxmap.conf file from the Control Station to the Data Mover, type:
$ server_file server_2 -get ntxmap.conf ntxmap.conf
Output:
server_2: done
Step Action
2 Use any text editor and edit the ntxmap.conf file to add, delete, or modify mapping entries.
The file format includes the following rule syntax for a bidirectional mapping for each Windows user:
domain : user : direction : unix_name
Note: The rule syntax for a domain, user, and unix_name includes: ASCII characters, blank characters, and
Unicode characters. Any special ASCII character can be used by using the "=xx" format, where xx is the ASCII
value of the character in hexadecimal. A blank character is a special character. Any Unicode character can
be used by using the "==xxxx" format, where xxxx is the hexadecimal value for the Unicode character.
Note: Domains and usernames are case-insensitive. "*" for domain means any domain is valid. A "#" character
at the beginning of the line is a comment. A comment can be added at the end of the line by using "#" followed
by the comment.
ntxmap bidirectional mapping — Examples on page 15 provides more information on bidirectional mappings.
4 Copy the ntxmap.conf file from the Control Station to the Data Mover by using this command syntax:
$ server_file <movername> -put ntxmap.conf ntxmap.conf
where:
<movername> = name of the Data Mover to which the file is being copied
Example:
To copy the ntxmap.conf file from the Control Station to the Data Mover, type:
$ server_file server_2 -put ntxmap.conf ntxmap.conf
Output:
server_2: done
Note: The modified ntxmap.conf file is used automatically after it is placed in the /.etc directory of the Data
Mover’s root file system.
Note: There is a risk of temporary inconsistency while the file is being moved, especially if the file is too large.
Restrictions on page 8 provides more information.
Managing
Example:
To verify only the syntax of the rules in ntxmap.conf file on server_2, type:
$ server_checkup server_2 -test CIFS -subtest ntxmap
Output
server_2:
-----------------------------Checks------------------------------------
Component CIFS:
Ntxmap : Checking the ntxmap configuration file..................Pass
Example:
To check the CIFS configuration, including the syntax of the rules in the ntxmap.conf file, on server_2, type:
$ server_checkup server_2 -test CIFS
Output
server_2:
-----------------------------Checks------------------------------------
Component CIFS:
ACL : Checking the number of ACLs per file system............Pass
Connection: Checking the load of CIFS TCP onnections...............Pass
Credential: Checking the validity of credentials...................Pass
DC : Checking the connectivity and configuration of Domain
Controlle..........................................................Pass
DFS : Checking the DFS configuration files and DFS registry..Pass
DNS : Checking the DNS configuration and connectivity to DNS
servers...........................................................Fail
EventLog : Checking the configuration of Windows Event Logs.......Pass
FS_Type : Checking if all file systems are in the DIR3 format....Pass
GPO : Checking the GPO configuration.........................Pass
HomeDir : Checking the configuration of home directory shares....Pass
I18N : Checking the I18N mode and the Unicode/UTF8 translation
tables............................................................ Pass
Kerberos : Checking password updates for Kerberos.................Pass
LDAP : Checking the LDAP configuration........................Pass
LocalGrp : Checking the database configuration of local groups....Pass
NIS : Checking the connectivity to the NIS servers...........Pass
NS : Checking the naming services configuration.............Pass
NTP : Checking the connectivity to the NTP servers...........Pass
Ntxmap : Checking the ntxmap configuration file.................Pass
Secmap : Checking the SECMAP database...........................Pass
Security : Checking the CIFS security settings....................Pass
Server : Checking the CIFS file servers configuration...........Pass
Share : Checking the network shares database...................Pass
SmbList : Checking the range availability of SMB IDs.............Pass
Threads : Checking for CIFS blocked threads......................Pass
UM_Client : Checking the connectivity to usermapper servers........Pass
UM_Server : Checking the usermapper server database................Pass
UnsupOS : Checking for unsupported client network operating
systems........................................................... Pass
UnsupProto: Checking for unsupported client network protocols......Pass
VC : Checking the configuration of Virus Checker servers....Pass
WINS : Checking the connectivity to WINS servers..............Pass
Note: A result with a '*' means that some tests were not executed. Use the -full option to run them.
Action
To verify the existing ntxmap mappings, use this command syntax:
$ server_cifssupport<movername> -secmap -list
where:
<movername> = name of the Data Mover
Example:
To verify the existing ntxmap mappings on server_2, type:
$ server_cifssupport server_2 -secmap -list
Output
server_2 : done
SECMAP USER MAPPING TABLE
UID Origin Date Name SID
692 ntxmap Wed Dec 26 14:15:14 2007 INTGW2K3\administrator S-1-5-
15-
56db7d78-9b661160-9e19279b-1f4
Disable ntxmap
Step Action
1 Using any text editor, create an empty file on the Control Station.
Example:
To create ntxmap_empty.conf file by using a text editor, type:
$ vi ntxmap_empty.conf
3 Copy the empty file on the Data Mover by using the following command syntax:
$ server_file <movername> -put <filename> ntxmap.conf
where:
<movername> = name of the Data Mover to which the file is being copied
Example:
To copy the ntxmap_empty.conf file from the Control Station to the Data Mover, type:
$ server_file server_2 -put ntxmap_empty.conf ntxmap.conf
Output:
server_2: done
4 Delete the existing ntxmap mappings in secmap cache by using the following command syntax:
$ server_cifssupport <movername> -secmap -delete -name <username>
-domain <domain name>
where:
<movername> = name of the Data Mover
Example:
To delete the existing ntxmap mapping in secmap, for the user WINuser of domain INTGW2K3, on server_2,
type:
$ server_cifssupport server_2 -secmap -delete -name WINuser -domain INTGW2K3
Output:
server_2: done
Troubleshooting
Error messages
All event, alert, and status messages provide detailed information and recommended actions
to help you troubleshoot the situation.
To view message details, use any of these methods:
◆ Unisphere software:
• Right-click an event, alert, or status message and select to view Event Details, Alert
Details, or Status Details.
◆ CLI:
• Use this guide to locate information about messages that are in the earlier-release
message format.
• Use the text from the error message's brief description or the message's ID to search
the Knowledgebase on EMC Online Support. After logging in to EMC Online Support,
locate the applicable Support by Product page, and search for the error message.
EMC Professional Services can help you implement your system efficiently. Consultants
evaluate your business, IT processes, and technology, and recommend ways that you can
leverage your information for the most benefit. From business plan to implementation, you
get the experience and expertise that you need without straining your IT staff or hiring and
training new personnel. Contact your EMC Customer Support Representative for more
information.
authentication
Process for verifying the identity of a user trying to access a resource, object, or service, such
as a file or a directory.
Control Station
Hardware and software component of VNX for file that manages the system and provides the
user interface to all VNX for file components.
Data Mover
In VNX for file, a cabinet component that is running its own operating system that retrieves
data from a storage device and makes it available to a network client. This is also referred to as
a blade.
domain
Logical grouping of Microsoft Windows Servers and other computers that share common
security and user account information. All resources such as computers and users are domain
members and have an account in the domain that uniquely identifies them. The domain
administrator creates one user account for each user in the domain, and the users log in to the
domain once. Users do not log in to each individual server.
domain controller
Server that authenticates user logins and maintains the security policy and the security account’s
master database for a Windows domain. Domain controllers manage user access to a network,
which includes logging in, authentication, and access to the directory and shared resources.
See also Windows domain.
LDAP-based directory
Directory servers that support LDAP, including Active Directory with IdMU, or SFU, OpenLDAP,
or iPlanet (also known as Sun Java System Directory Server and Sun ONE Directory Server).
ntxmap
Customized software used to support mapping requirements in a multiprotocol environment.
user file
Refers to the passwd file that resides on each Data Mover.
User ID (UID)
Numeric identifier that corresponds to a particular user.
Usermapper
Service that automatically maps distinct Windows users and groups to distinct UNIX-style
UIDs and GIDs.
Windows domain
Microsoft Windows domain controlled and managed by a Microsoft Windows Server by using
the Active Directory to manage all system resources and by using the DNS for name resolution.
Windows NT domain
Microsoft Windows domain controlled and managed by a Microsoft Windows NT server by
using a SAM database to manage user and group accounts and a NetBIOS namespace. In a
Windows NT domain, there is one primary domain controller (PDC) with a read/write copy of
the SAM, and possibly several backup domain controllers (BDCs) with read-only copies of the
SAM.
See also domain and domain controller.
C ntxmap (continued)
mapping methods 12
CIFS mapping rules 14
mapping methods 11 mapping verification 24
verifying configuration 22 Unix to Windows mapping 13
command line interface 9 using with secmap 15
configuring ntxmap 15 Windows credentials mapping 12
creating ntxmap.conf file 18 ntxmap.conf file
creating 18
function 12
D modifying 19
disabling ntxmap 26 verifying 22
E R
EMC E-Lab Navigator 28 rules, defining mapping 14
error messages 28
S
I secmap 15
information, related 9
T
M troubleshooting 27
mapping methods
Unix to Windows mapping 13 U
Windows credential 12
messages, error 28 user mapping 11
modifying ntxmap.conf file 19
multiprotocol 7
V
N verifying
CIFS configuration 22
ntxmap mapping 24
configuring 15
description 7
disabling 26
verifying (continued) W
ntxmap.conf file 22
Windows credentials mapping 12