Docu48476 - Configuring VNX User Mapping 8.1 PDF
Docu48476 - Configuring VNX User Mapping 8.1 PDF
Docu48476 - Configuring VNX User Mapping 8.1 PDF
Release 8.1
EMC Corporation
Corporate Headquarters:
Hopkinton, MA 01748-9103
1-508-435-1000
www.EMC.com
Copyright 2009 - 2013 EMC Corporation. All rights reserved.
Published March 2013
EMC believes the information in this publication is accurate as of its publication date. The
information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION
MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO
THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an
applicable software license.
For the most up-to-date regulatory document for your product line, go to the Technical
Documentation and Advisories section on EMC Powerlink.
For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on
EMC.com.
All other trademarks used herein are the property of their respective owners.
Corporate Headquarters: Hopkinton, MA 01748-9103
Preface.....................................................................................................7
Chapter 1: Introduction...........................................................................9
System requirements..................................................................................10
User interface choices.................................................................................10
Related information.....................................................................................12
Chapter 2: Concepts.............................................................................13
Overview.....................................................................................................14
User mapping in Windows-only environments............................................16
User mapping in multiprotocol environments..............................................16
Secure mapping..........................................................................................17
Creating secmap mapping entries......................................................17
Checking and updating secmap mapping entries..............................18
User mapping and ntxmap..........................................................................18
User mapping database..............................................................................18
User mapping process................................................................................19
Usermapper................................................................................................20
Restrictions.........................................................................................20
Planning considerations.....................................................................21
Using the default single-VNX Usermapper configuration...................22
Using a multi-VNX Usermapper environment....................................22
LDAP-based directory services...................................................................23
Local files....................................................................................................23
NIS..............................................................................................................24
Active Directory...........................................................................................24
UNIX user management snap-in........................................................25
Chapter 7: Troubleshooting..................................................................55
EMC E-Lab Interoperability Navigator.........................................................56
Known problems and limitations..................................................................56
Known problems and limitations in using secmap..............................56
Usermapper events and notifications..........................................................57
Error messages...........................................................................................58
EMC Training and Professional Services....................................................59
Glossary..................................................................................................61
Index.......................................................................................................65
As part of an effort to improve and enhance the performance and capabilities of its product
lines, EMC periodically releases revisions of its hardware and software. Therefore, some
functions described in this document may not be supported by all versions of the software
or hardware currently in use. For the most up-to-date information on product features, refer
to your product release notes.
If a product does not function properly or does not function as described in this document,
please contact your EMC representative.
Note: Emphasizes content that is of exceptional importance or interest but does not relate to
personal injury or business/data loss.
Indicates a hazardous situation which, if not avoided, will result in death or serious
injury.
Note: Do not request a specific support representative unless one has already been assigned to
your particular system problem.
Your comments
Your suggestions will help us continue to improve the accuracy, organization, and overall
quality of the user publications.
Please send your opinion of this document to:
techpubcomments@EMC.com
Introduction
System requirements
Table 1 on page 10 describes the EMC VNX series software, hardware, network, and
storage configurations required for using user mapping as described in this document.
Network Windows Server or Windows NT domain. You must configure the domains with the fol-
lowing:
Active Directory
Kerberos or NT Lan Manager (NTLMSSP)
DNS
NTP
Windows NT domains:
Storage Verify that sufficient space is available in the root file system. Contact your EMC Customer
Support Representative for assistance with determining size requirements.
The VNX release notes contain additional, late-breaking information about VNX management
applications.
Using Unisphere
Unisphere can be used to configure a Data Mover to use Usermapper and NIS, as
described in Table 2 on page 11. You cannot use Unisphere to configure the Identity
Management for UNIX feature, or to manage the Active Directory and local files.
NIS To configure the Data Mover as an NIS client, select System Network
and click Interfaces.
Unisphere online help provides more information on using Unisphere to configure user
mapping.
Note: You can also use the configuration wizards to set up the use of NIS or basic Usermapper.
Related information
For specific information related to the features and functionality described in this document:
VNX Command Line Interface Reference for File
Celerra Network Server Error Messages Guide
Parameters Guide for VNX
Configuring Events and Notifications on VNX for File
Configuring VNX Naming Services
Configuring and Managing CIFS on VNX
Installing Management Applications on VNX
Managing a Multiprotocol Environment on VNX
VNX for File man pages
Using NTMigrate with VNX
Using Windows Administrative Tools on VNX
VNX wizards
Unisphere software provides wizards for performing setup and configuration tasks. The
Unisphere online help provides more details on the wizards.
Concepts
Overview
Every VNX user must be assigned a unique numeric UID and GID to indicate the ownership
of directories and files. The VNX uses directory and file ownership to apply and enforce
access permissions and quota limits.
Note: For connections from Windows users, file access checking is performed by using SIDs only.
This is done to prevent errors due to UID mismatches and to reduce dependency on the Usermapper
database.
Like the VNX, UNIX/Linux systems use UIDs and GIDs to identify users and groups.
Consequently, the VNX can use the UIDs and GIDs supplied by UNIX/Linux clients without
requiring any additional mappings. Windows, however, does not use numeric IDs to identify
users. Instead, it uses strings called security identifiers (SIDs).Therefore, before you configure
the Windows file-sharing service (referred to as CIFS) on the VNX, you must select a method
of mapping Windows SIDs to UIDs and GIDs. You select a mapping method based on
whether you have a Windows-only or UNIX/Linux and Windows (multiprotocol) environment.
Figure 1 on page 15 identifies the factors that determine the user mapping technique best
suited for the environment.
Start
Yes
UNIX Yes
No
* cifs resolver parameter must be set to 1
Local files
+ cifs useADMap parameter must be set to 1 VNX-000023
Overview 15
Concepts
Note: Before you configure and run Usermapper, include only one primary Usermapper in a VNX
environment.
Note: If a user in a multiprotocol environment uses only a single login (either through Windows or
UNIX/Linux), then you can use Usermapper. If a user has only one account, mapping to an equivalent
identity in the other environment is not necessary.
Secure mapping
Secure mapping (secmap) is a cache that contains all mappings between SIDs, and UID or
GIDs used by a Data Mover or Virtual Data Mover (VDM). Secmap only caches mappings
that are generated by mapping mechanisms used by VNX; secmap does not generate
mappings. Normally, mappings are persistent and are never updated.
The secmap database stores two kinds of information:
SID to UID or GID mappings
UID or GID to SID reverse mappings
The Data Mover permanently caches all mappings it receives from any source (Usermapper,
LDAP-based directory services, local files, NIS, and Active Directory) in the secmap database,
making the response to subsequent mapping requests faster and less susceptible to network
problems. Reverse mapping provides better quota support.
Note: Secmap caching is enabled by default and does not require any special setup. EMC recommends
that you use secmap, although it can be disabled if necessary.
Secure mapping 17
Concepts
Note: After an update is performed, an update of the ACLs of all file systems should be forced to take
account of the new mappings.
Check secmap mapping entries on page 49 and Update secmap mapping entries on page
50 describe these tasks.
Note: If an nsswitch.conf file has been created on the Data Mover, the order in which the UNIX or
Linux-based sources (local files, NIS, and LDAP-based directory servers) are queried is determined
by that file. Configuring VNX Naming Services provides information on using the nsswitch.conf
file.
a. The Data Mover first checks its secmap database for an existing SID to UID or GID
mapping.
b. If no mapping is found, the Windows domain controller is queried for the user or group
name associated with the SID, and then the Data Mover checks its local passwd and
group files for a UID or GID to associate with the name.
c. If no mapping is found, and NIS is configured, the Data Mover queries NIS for a UID
or GID to associate with the name.
d. If no mapping is found, and LDAP-based directory services are configured (including
Active Directory with SFU or IdMU), the Data Mover queries the LDAP-based directory
services for a UID or GID to associate with the name.
e. If no mapping is found, and queries to the Active Directory (by using VNX CIFS MMC
snap-ins) are configured, the Data Mover queries the Active Directory for an SID to
UID or GID mapping.
f. If no mapping is found, the Data Mover queries Usermapper for an SID to UID or GID
mapping.
g. The primary Usermapper service checks its database to determine if this user or group
has already been assigned a UID or GID. If not, the primary Usermapper generates
a new UID or GID and adds the new user or group and the mapping to its database.
It then returns the mapping to the Data Mover.
h. The Data Mover permanently caches all mappings it receives from any source
(Usermapper, LDAP-based directory services including Active Directory with SFU or
IdMU, local files, NIS, and Active Directory by using MMC snap-ins) in the secmap
database, making the response to subsequent SID to UID or GID mapping requests
faster and less susceptible to network problems.
i. The user is then authenticated and given access to the CIFS share (network drive).
Usermapper
Usermapper is a VNX service that automatically generates and maintains a database that
maps SIDs to UIDs and GIDs for users or groups accessing file systems from a Windows
domain. Usermapper performs these functions:
One instance of the Usermapper service serves as the primary Usermapper, meaning
that it assigns UIDs and GIDs to Windows users and groups. By default, this instance is
configured on the Data Mover in slot 2 (server_2).
The other Data Movers in a single VNX environment are configured as clients of the
primary Usermapper service, meaning that they send mapping requests to the primary
service when they do not find a mapping for a user or group in their local cache. By
default, all the client Data Movers automatically relay a broadcast over the VNX systems
internal interfaces to discover the location of the primary Usermapper service. Using the
default single-VNX Usermapper configuration on page 22 provides information on
Usermapper services in a single VNX environment.
In a multi-VNX environment, only a single primary Usermapper service is configured on
one of the VNX platforms, and all the Data Movers on that platform will use the primary
Usermapper service. Each additional VNX platform will have its own secondary
Usermapper service, and all their respective Data Movers would point to its secondary
Usermapper. Like a primary Usermapper service, a secondary Usermapper service
checks its database to determine if a user or group has already been assigned a UID or
GID. If not, it forwards the mapping request to the primary Usermapper service. The
primary Usermapper service checks its database and, if necessary, generates a new
UID or GID, and returns the mapping to the secondary Usermapper service.
The secondary Usermapper service then adds the new user or group and the mapping to
its database, and returns the mapping to the Data Mover. If the secondary Usermapper
service is unavailable, new users cannot access files. Existing users can access files only
if a user has used the Data Mover before and the Data Movers local cache contains the
previous mapping.
Configure a multi-VNX Usermapper environment on page 28 provides information on
configuring Usermapper services in an environment with more than one VNX sharing the
same domain space.
Restrictions
Before you configure and run Usermapper, note these restrictions:
Designate only one primary Usermapper service in a given VNX environment, and only
on one of the VNX platforms, in case of a multi-VNX environment. Otherwise, the same
user can be assigned different mappings. Additional VNX platforms should run a secondary
Usermapper service and point to the primary Usermapper service to obtain their mappings.
A primary Usermapper service and a secondary Usermapper service should not be run
on the same VNX cabinet.
In a single VNX, ensure that there is only one instance of the Usermapper service, either
primary or secondary. All the other Data Movers in that VNX are clients of the primary
or secondary service.
In a multi-VNX environment, ensure that the primary Usermapper service is enabled
before you configure any secondary Usermapper services.
By default, Usermapper runs on the Data Mover in slot 2 (server_2). This is the preferred
location from which to run the primary or secondary Usermapper service.
You cannot configure a primary or secondary Usermapper service on a Virtual Data
Mover (VDM).
Planning considerations
Before you begin using Usermapper, consider these situations:
Usermapper stops mapping new UIDs and GIDs when the root file system of the Data
Mover on which the Usermapper database is stored becomes full. In this situation, new
users will not be allowed access to system objects. The size of the root file system that
is required is based on the number of users in the Windows environment. Contact your
EMC Customer Support Representative for assistance with determining size requirements.
If you are replicating a Windows environment that uses Usermapper or if you are using
the EMC Symmetrix Remote Data Facility (SRDF ), special Usermapper restrictions
might apply. Contact your EMC Customer Support Representative for more information.
In Usermapper, the UID and GID ranges are fixed in the Usermapper database, and
Usermapper automatically assigns new UIDs and GIDs based on the next available
value. Therefore, it does not need to use a Usermapper configuration file to define UID
and GID ranges. However, it is possible to import an existing usrmap.cfg and use this
file to define UID and GID ranges. This is referred to as the manual mapping method.
After the ranges defined in the usrmap.cfg file are enabled, Usermappers automatic
mapping method maintains this information and prevents duplicate mappings.
Note: If there is no special reason to use particular UID and GID ranges for the environments
domains, EMC encourages you to use the automatic mapping method and let Usermapper
automatically assign new UIDs and GIDs based on the next available values. If a future revision
to the usrmap.cfg file cannot be avoided, contact your EMC Customer Support Representative for
assistance.
Usermapper supports the SID History functionality introduced in Windows 2000. This
aids the migration of users from Windows NT domains to Windows 2000 native mode
domains. To use the SID History, it must be enabled in Windows 2000 and on the VNX
system. Windows 2000 documentation provides the correct procedure for enabling SID
Usermapper 21
Concepts
History on the Windows 2000 systems. With SID History enabled, when you migrate
users from a Windows NT domain or a Windows 2000 domain in mixed mode to a
Windows 2000 domain in native mode, the Security Access Token contains the SID
History from the Windows NT domain and a new SID from the Windows 2000 domain.
Usermapper automatically assigns UID and GID mappings, including SID History, by
default.
Note: When a new system running software version 5.3 or later is started for the first time, it is
automatically configured with the default single VNX Usermapper configuration. In this situation,
Usermapper is automatically enabled as a VNX for file service and no additional installation or
configuration procedures are required.
The default Usermapper configuration consists of a single VNX in which the Data Mover in
slot 2 (server_2) is configured with the primary Usermapper service. Each of the remaining
Data Movers in the VNX system cache all the SID to UID or GID mappings it has used.
However, if one of these Data Movers is accessed by a user for whom it does not have a
mapping, it queries the primary Usermapper service. These Data Movers are clients of the
primary Usermapper service. By default, all the Data Movers in the VNX system automatically
relay a broadcast over the VNX internal interfaces to discover the location of the primary
Usermapper service.
Certain UID and GID values are reserved and cannot be mapped to SIDs. For example, 0
is reserved for the UNIX root account. Additional numbers are reserved for maintenance.
UID and GID values can start at 32 KB. The maximum possible value for UIDs and GIDs is
imposed by the underlying file system. All domain users and groups accessing this file
system are assigned UIDs and GIDs based on these definitions.
Note: As in a standard VNX configuration, you can configure another Data Mover to serve as a failover
Data Mover, providing a backup for the primary Usermapper service.
Display Usermapper status on page 38 describes how to verify the Usermapper configuration
and display its current status. In case the primary Usermapper service is not automatically
enabled, Chapter 7 provides information that can help resolve the issue. Chapter 5 provides
information on managing the Usermapper environment.
send mapping requests to their local secondary Usermapper service, and each secondary
Usermapper service then forwards these requests to the single primary Usermapper service.
The secondary Usermapper service sends mapping requests to the primary Usermapper
service one at a time and only when needed. Therefore, all the secondary Usermapper
services in an environment might not have the same entries in their databases.
Note: If there is any possibility of file systems ever being replicated, then the VNX servers involved
should share a single primary Usermapper service.
Note: EMC recommends that you use the Active Directory with SFU or IdMU for user mapping in
multiprotocol environments.
Note: User account migration tools on page 26 provides information about migrating user information
from one environment to another.
Local files
If the multiprotocol environment consists primarily of UNIX users and has more than one
Windows domain, or usernames that are not unique across the Windows domains, you can
manually edit the Data Movers local passwd and group files. Copy local files from the Data
Mover on page 33 describes how to manually add Windows users and groups to the passwd
and group files on the Data Mover.
By default, the Data Mover checks for a username in the form username.domain and a
groupname in the form groupname.domain. If the usernames and group names do not have
a domain association, you must add the Windows domain name and verify that the Windows
user is assigned the UID and GID of the existing UNIX account.
If you have added usernames and group names to the local files without a domain association,
you can set the cifs resolver parameter so the Data Mover looks for the names without
appending the domain. Retrieve user and group names without a domain association on
page 32 provides a description of using the cifs resolver parameter.
Note: User account migration tools on page 26 provides information about migrating user information
from one environment to another.
NIS
If the multiprotocol environment consists primarily of UNIX users and has only one Windows
domain, or usernames that are unique across multiple Windows domains, you can use NIS
to manage user and group mapping.
Configuring VNX Naming Services provides information on configuring a Data Mover to
access a NIS server. NIS server documentation provides information about manually updating
the NIS passwd and group maps.
Note: All of the entries (Windows names, usernames, domain names, and global group names) in the
passwd and group maps must be typed in lowercase ASCII only.
After you have configured NIS, the Data Mover automatically checks NIS for a user and
group name. By default, it checks for a username in the form username.domain and a group
name in the form groupname.domain. If you have added usernames and group names to
NIS without a domain association (which reflects the use of NIS files without any
modifications), you can set the cifs resolver parameter so the Data Mover looks for the
names without appending the domain. Retrieve user and group names without a domain
association on page 32 provides a description of using the cifs resolver parameter.
Note: User account migration tools on page 26 provides information about migrating user information
from one environment to another.
Active Directory
Before the introduction of Microsoft software that provides a UNIX environment on Windows
(Active Directory with SFU or IdMU), Active Directory was primarily used in Windows Server
environments to provide authentication and authorization for Windows users.
Note: EMC recommends that you use Active Directory with SFU or IdMU instead of Active Directory
with Celerra CIFS MMC snap-ins. Do not use the ADmap parameter. LDAP-based directory services
on page 23 provides more information on using Active Directory with SFU or IdMU.
However, if the Active Directory schema was extended with an EMC proprietary schema to
include UNIX attributes for Windows users and groups, you could configure a Data Mover
to query the Active Directory to determine if a user and the group of which the user is a
member have UNIX attributes assigned. If so, information stored in these attributes could
be used for file access authorization.
To configure a Data Mover to query the Active Directory for UNIX attributes, you must install
the UNIX user management component of the Celerra CIFS management MMC snap-ins.
You must also set the cifs useADMap parameter. Configure a Data Mover to query the Active
Directory on page 36 describes this task.
Installing Management Applications on VNX for File and the Celerra UNIX User Management
and Celerra UNIX Attribute Migration online help systems provide more information. User
account migration tools on page 26 provides information about migrating user information
from one environment to another.
Active Directory 25
Concepts
Note: You cannot use this extension to manage users or groups on a remote domain.
Note: Using this tool extends the Active Directory schema. After the schema is extended, you cannot
revert to the original Active Directory schema.
NTMigrate
NTMigrate is a tool that migrates Windows users to an existing UNIX UID or GID database
(local passwd file or NIS). NTMigrate collects user information from the Windows domain
and merges it with UNIX passwd and group files.
NTMigrate is best suited for mapping large Windows domains into UNIX UIDs and GIDs.
Using NTMigrate with VNX provides more information.
Configuring in Windows
Environments
Note: In this procedure, the VNX that supports the primary Usermapper service is referred to as VNX_A
and the VNX that runs the secondary Usermapper service is referred to as VNX_B.
On VNX_A, verify that the primary Usermapper service is enabled on server_2, which is the
default configuration.
Action
To verify that the primary Usermapper service is enabled, use this command syntax:
$ server_usermapper <movername>
where:
<movername> = name of the Data Mover
Example:
To verify that the primary Usermapper service is enabled on server_2 of VNX_A, type:
$ server_usermapper server_2
Output
The default Usermapper configuration always designates the Data Mover in slot 2 (server_2)
as supporting the primary Usermapper service. You must explicitly configure a Data Mover
on VNX_B to support a secondary Usermapper service. On VNX_B, disable the primary
Usermapper service that is enabled by default.
No user mapping requests should be sent to the primary Usermapper service on VNX_B
before you have reconfigured it. Consequently, you should not configure CIFS on the VNX_B
Data Movers until the Usermapper service is reconfigured as a secondary service.
Action
To disable the primary Usermapper service, use this command syntax:
$ server_usermapper <movername> -disable
where:
<movername>= name of the Data Mover
Example:
To disable the primary Usermapper service on server_2 of VNX_B, type:
$ server_usermapper server_2 -disable
Output
server_2 : done
After you have disabled the primary Usermapper service on VNX_B, you can configure
server_2 to run as a secondary Usermapper service.
When you enable a secondary Usermapper service, you also indicate the location of the
primary Usermapper service to which the secondary service will send mapping requests.
To do this, specify the IP address of the Data Mover on which the primary service is located.
Note: The primary Usermapper service must be enabled before you configure a secondary service.
Action
To enable a secondary Usermapper service, use this command syntax:
$ server_usermapper <movername> -enable primary=<ip addr>
where:
<movername> = name of the Data Mover
Action
<ip addr> = network IP address of the Data Mover on which the primary Usermapper service is running
Example:
To enable a secondary Usermapper service on server_2 of VNX_B, type:
$ server_usermapper server_2 -enable primary=192.168.21.1
Output
server_2 : done
Verify that the secondary Usermapper service has been enabled on server_2 of VNX_B.
Action
To verify that the secondary Usermapper service is enabled, use this command syntax:
$ server_usermapper <movername>
where:
movername = name of the Data Mover
Example:
To verify that the secondary Usermapper service is enabled on server_2 of VNX_B, type:
$ server_usermapper server_2
Output
Configuring in Multiprotocol
Environments
Note: Active Directory with SFU or IdMU requires that cifs resolver be set so that user and group names
are retrieved with a domain extension.
Action
To change the default format of username and group name so that they can be retrieved without a domain extension, use
this command syntax:
$ server_param <movername> -facility cifs -modify resolver -value 1
where:
<movername> = name of the Data Mover
Example:
To change the default format of username and group name so they can be retrieved without a domain extension, type:
$ server_param server_2 -facility cifs -modify resolver -value 1
Output
server_2 : done
Note: Configuring VNX Naming Services provides additional information on using local files for naming
services.
Procedure
To manually add Windows users and groups to the passwd and group files on the Data
Mover:
1. Copy local files from the Data Mover on page 33
2. Add the Windows domain name as a group name on page 34
3. Add Windows usernames on page 35
4. Copy edited local files to the Data Mover on page 36
Local files on page 23 provides conceptual information.
Before editing the local files, you must copy them from the Data Mover.
Copy the passwd and group files from the Data Mover to the Control Station for editing. If
the local files do not exist, create them with an ASCII editor such as vi or Emacs.
This command overwrites existing files of the same name without notification. Be
careful when copying files.
Action
To copy the passwd or group file, use this command syntax for each file:
$ server_file <movername> -get <src_file> <dst_file>
where:
<movername> = name of the Data Mover
Example:
To copy the passwd file to /home/nasadmin/passwd, type:
$ server_file server_2 -get passwd /home/nasadmin/passwd
Output
server_2 : done
Use this procedure to add the Windows domain name to the copy of the UNIX group file on
the Data Mover.
Use the UNIX text editors vi, Emacs, or Windows Notepad to manually modify the
configuration file.
Action
Using a text editor, add the Windows domain name as a group name in the group file. Assign a GID for the newly created
group name. The group file entries are in the following format:
<groupname.domain>:*:<GID>:
where:
<groupname.domain> = group name and Windows domain name
* = UNIX password for the group; this field should contain an asterisk (*) because the password is not used on the VNX.
<GID> = unique numeric group ID that you assign to the group name
Example 1:
To add the Windows domain galaxy to the group file, add the following line:
galaxy:*:100
The Windows domain galaxy is the group name. The GID is 100.
Example 2:
Here is an example of a group file, including the galaxy example and the default Windows global groups:
.(numerous UNIX groups skipped)
galaxy:*:100:
domain=20admins.galaxy:*:101: domain=20users.galaxy:*:102:
domain=20guests.galaxy:*:103:
Use this procedure to add usernames to the copy of the UNIX passwd file on the Data Mover.
Action
Add the Windows usernames from the Windows domain to the passwd file and assign each user a unique UID and the
GID specified for the Windows domain in Add the Windows domain name as a group name on page 34.
Password file entries are in the following format:
<user.domain>:*:<UID>:<GID> :<name>:<path>:<shell>
where:
<user.domain> = Windows username and domain name, which is appended to preclude accidental mapping to existing
UNIX or Windows clients of the same name
* = UNIX password for the user; if the user authentication mode on the Data Mover is set to NT or SHARE, this field
should contain an asterisk (*); if the Data Mover uses UNIX user authentication, the field should contain the encrypted
password for the user
<UID> = unique user ID that you assign
<name>, <path>, and <shell> are optional informational fields and are ignored during processing
Example:
The following is an example of a password file entry of user, glenn, in the domain galaxy. This requires an entry in passwd
as:
glenn.galaxy:*:530:100:J.GLENN:/usr/home/jdir:/bin/csh
Use this procedure to copy the edited local files (passwd or group file) back to the Data
Mover.
This command overwrites existing files of the same name without notification. Be
careful when copying files.
Action
To copy the edited local files back to the Data Mover, use this command for each file:
$ server_file <movername> -put <src_file> <dst_file>
where:
<movername> = name of the Data Mover
Examples:
$ server_file server_2 -put passwd passwd
Output
server_2 : done
2. Set the cifs useADMap parameter to 1 to enable the snap-ins to interact with the Data
Mover. Installing Management Applications on VNX for File describes how to enable the
CIFS management snap-ins and tools.
Managing Usermapper
Action
To display the status of the Usermapper service, use this command syntax:
$ server_usermapper <movername>
where:
<movername> = name of the Data Mover
Example:
To display the status of the Usermapper service on server_2, type:
$ server_usermapper server_2
Output Note
server_2 : Usrmapper service: Enabled Usermapper has three operational states:
Service Class: Secondary Primary =
192.168.21.1(c) Uninitialized When Usermapper is not available on
the Data Mover
Initialized When Usermapper has been created on
the Data Mover, but has been disabled for some reason
Enabled When Usermapper is running
You should have only one instance of the Usermapper ser-
vice, either primary or secondary, in a single VNX server.
All the other Data Movers in that environment are clients of
the primary or secondary service.
The server_cifs command displays a Data Movers CIFS configuration, including the
Usermapper service it is using.
If you run the server_cifs command for the Data Mover on which the Usermapper service
is running (typically server_2), the Usermapper service listed displays the Data Movers
loopback address (127.0.0.1) as the IP address of its Usermapper service.
Action
To display the Usermapper service used by a Data Mover, use this command syntax:
$ server_cifs <movername>
where:
<movername> = name of the Data Mover
Example:
To display the Usermapper service used by server_3, type:
$ server_cifs server_3
Output
server_3 :
96 Cifs threads started
Security mode = NT
Max protocol = NT1
I18N mode = UNICODE
Home Directory Shares DISABLED
Usermapper auto broadcast enabled
Note
This example shows that server_3 is using the Usermapper service located on server_2 at internal IP addresses
128.221.252.2 and 128.221.253.2; the service is available, and the service was located using the autodiscovery broadcast.
Typically, you import information into the Usermapper database from a user and group file
to reimport an edited Usermapper database, migrate the primary Usermapper service from
one Data Mover to another, or upgrade or migrate the Usermapper configuration. Contact
your EMC Customer Support Representative for assistance if you are migrating the primary
Usermapper service from one Data Mover to another.
Use the import option of the server_usermapper command to import a user or group file.
Usermapper can import files in either of two formats: a standard UNIX format that corresponds
to the passwd and group file formats, or a format that includes the SID in the first field.
Example of a user file entry in standard UNIX format (Format 1):
rob.hilder.dir:*:26831:903:rob.hilder.dir:/usr/rob.hilder.dir:/bin/sh
Example of a user file entry in SID-based format (Format 3):
S-1-5-15-139d2e78-56b177fd-5475b975-3323d:*:26831:903:user rob.hilder
from domain
dir:/usr/S-1-5-15-139d2e78-56b177fd-5475b975-3323d:/bin/sh
Example of a group file entry in standard UNIX format (Format 1):
people.mass.subscribers.db.dir:*:58362:people.mass.subscribers.db.dir:
Example of a group file entry in SID-based format (Format 3):
S-1-5-15-139d2e78-56b177fd-5475b975-2c3d6:*:58362:people.mass.subscribers.db.dir:
Action
To import user and group information into the Usermapper database, use this command syntax:
$ server_usermapper <movername> -Import {-user | -group} <pathname>
where:
<movername> = name of the Data Mover
Examples:
To import user information into the Usermapper database on server_2, type:
$ server_usermapper server_2 -Import -user /nas/cifs/usrmapperV3/linux/usrmap.passwd
Output
server_2 : done
Typically, you would export user and group information from the Usermapper database to
migrate the primary Usermapper service, back up the Usermapper database, or collect
information for troubleshooting.
Use the export option of the server_usermapper command to export a user or group file.
Usermapper exports files in a format that includes the SID in the first field.
Example of a user file entry in SID-based format (Format 3):
S-1-5-15-139d2e78-56b177fd-5475b975-3323d:*:26831:903:user rob.hilder
from domain
dir:/usr/S-1-5-15-139d2e78-56b177fd-5475b975-3323d:/bin/sh
Example of a group file entry in SID-based format (Format 3):
S-1-5-15-139d2e78-56b177fd-5475b975-2c3d6:*:58362:people.mass.subscribers.db.dir:
Action
To export user and group information from the Usermapper database, use this command syntax:
$ server_usermapper <movername> -Export {-user | -group} <pathname>
where:
<movername> = name of the Data Mover
Examples:
To export user information from the Usermapper database on server_2, type:
$ server_usermapper server_2 -Export -user /home/nasadmin/backup.passwd
Output
server_2 : done
If an issue seems to require a change to a Usermapper mapping entry, consult your EMC
Customer Support Representative to determine the best course of action.
Note: Changes made to the Usermapper database are not reflected by a client Data Mover, if the client
Data Mover has already cached the existing Usermapper information in its local cache. If the files and
folders have already been created by using the existing UIDs and GIDs, just changing the UID or GID
map will make file objects inaccessible.
Back up Usermapper
1. As root, dump the password and group files to a specified directory by typing:
$ server_usermapper server_2 -Export -user /home/nasadmin/backup.passwd
2. Make a backup copy of the current usrmap.cfg file (if one is in use) by typing:
$ cp /nas/rootfs/slot_2/.etc/usrmapper/usrmap.cfg /home/nasadmin/usrmap.cfg
Action
To change the default Usermapper UID or GID values, use this command syntax:
$ server_param <movername> -facility usrmap -modify <param_name> -value
<new_value>
where:
<movername> = name of the Data Mover
Example:
To change the minimum UID value, type:
$ server_param server_2 -facility usrmap -modify minuid -value 32
To change the maximum UID value, type:
$ server_param server_2 -facility usrmap -modify maxuid -value 2147483647
Output
server_2 : done
Managing secmap
Disable secmap
Secmap caching is enabled by default when CIFS service starts. It is automatically disabled
when CIFS service stops. It can also be disabled by using the parameter cifs secmap.enable.
This parameter is only taken into account at CIFS startup.
Action
To disable secmap caching, use this command syntax:
$ server_param <movername> -facility cifs -modify secmap.enable -value 0
where:
<movername> = name of the Data Mover
Example:
To disable secmap caching, type:
$ server_param server_2 -facility cifs -modify secmap.enable -value 0
Output
server_2 : done
where:
<movername> = name of the Data Mover
<SID> = SID
<user_id> = UID
<group_id> = GID
Example:
To display all the secmap mapping entries on server_2, type:
$ server_cifssupport server_2 -secmap -list
To display the secmap mapping entry on server_2 for the user user1 in domain NASDOCS, type:
$ server_cifssupport server_2 -secmap -list -name user1 -domain NASDOCS
Output Note
server_2 : done The output includes the SID, type (user or group), ID (UID
or GID according to type), origin, domain, and account names
(optional).
If a mapping is not found, the message, mapping not found,
is returned.
<user_id> = UID
<group_id> = GID
Example:
To display the secmap reverse mapping entry on server_2 for UID 32771, type:
$ server_cifssupport server_2 -secmap -list -uid 32771
Output Note
server_2 : done The output might include multiple SIDs if more than one SID
has been mapped to the specified ID. The output displays
all information associated with the SID.
Action
To create secmap mapping entries, use this command syntax:
$ server_cifssupport <movername> -secmap -create{ -name <name> -domain <do
main_name> | -sid <SID> }
where:
<movername> = name of the Data Mover
<SID> = SID
Example:
To create a secmap mapping entry on server_2 for the user user3 in domain NASDOCS, type:
$ server_cifssupport server_2 -secmap -create -name user3 -domain NASDOCS
Output Note
server_2 : done The output displays all mappings that have changed after
they were introduced to the database.
Action
To check all the secmap mapping entries, use this command syntax:
$ server_cifssupport <movername> -secmap -verify {-name <name> -domain <do
main_name> | -sid <SID>}
where:
<movername> = name of the Data Mover
<SID> = SID
Example:
To check all the secmap mapping entries on server_2, type:
$ server_cifssupport server_2 -secmap -verify -user user3 -domain NASDOCS
Output Note
server_2 : done The output displays all mappings that have changed after
they were introduced to the database.
Action
To update all the secmap mapping entries, use this command syntax:
$ server_cifssupport <movername> -secmap -update { -name <name> -domain
<domain_name> | -sid <SID>}
where:
<movername> = name of the Data Mover
<SID> = SID
Example:
To update all the secmap mapping entries on server_2, type:
$ server_cifssupport server_2 -secmap -update -user user3 -domain NASDOCS
Output Note
server_2 : done The output displays all mappings that have been updated.
Action
To remove secmap mapping entries, use this command syntax:
$ server_cifssupport <movername> -secmap -delete { -name <name> -domain
<domain_name> | -sid <SID>}
where:
<movername> = name of the Data Mover
<SID> = SID
Example:
To remove a secmap mapping entry on server_2 for the user user3 in domain NASDOCS, type:
$ server_cifssupport server_2 -secmap -delete -name user3 -domain NASDOCS
Output
server_2 : done
Example:
To export secmap mapping entries on server_2, type:
$ server_secmap server_2 -secmap -export -file exportfile.txt
Output Note
server_2 : done If you do not specify a filename, the secmap database is
displayed on the screen.
Example:
To import secmap mapping entries on server_2, type:
$ server_cifssupport server_2 -secmap -import -file importfile.txt
Output Note
server_2 : If imported mappings conflict with existing mappings, they
are rejected and an error is returned.
Example:
To display current secmap status on server_2, type:
$ server_cifssupport server_2 -secmap -report
Output
server_2 : done
Name :server_2
State :Enabled
Fs : /
Used nodes : 27
Used blocks : 0
Name SID
INTGW2K3 S-1-5-15-56db7d78-9b661160-9e19279b-ffffffff
Troubleshooting
The primary Usermapper service must When you run the server_usermapper Check the operational state of the prima-
be enabled before secondary services <movername> -enable primary= com- ry service and enable it by using the
can be configured. mand, you receive the following error: server_usermapper <movername> -
enable command.
Error 4020: <movername>:failed to
complete command
Usermapper stops mapping new UIDs The following errors are entered repeat- Determine the required size of the root
and GIDs after the root file system of edly in the server log for any additional file system based on the number of
the Data Mover (where the Usermapper mapping requests after the root file users in the Windows environment.
database is stored) becomes full. New system reaches capacity: Contact your EMC Customer Support
users will be denied access to system Representative for assistance in deter-
error: -20 for user uid request
objects. mining size requirements.
error: -20 for group gid request
Table 4 on page 57 describes known problems that might occur when using secmap and
presents workarounds.
No new mappings created If the secmap file system is nearly full, Secmap will work in a degraded mode
the secmap database might reach a until the file system where it resides is
point where it cannot store new map- cleaned or extended.
pings although it can continue to return
existing mappings.
Synchronization required with mapping By default, secmap is a write-once, Use the secmap commands to check
services read-many cache to avoid accidental database consistency and possibly fix
mapping modifications. However, when mapping inconsistencies.
mappings are purposely changed, the
After modifying
new mapping is not automatically made
mappings,you
in secmap. The new mapping has to be
must update the
enforced manually in secmap before
ACLs to ensure
resetting the ACL. Consequently,
that they use the
secmap can be out of sync if mappings
new mappings.
are changed in mapping services.
Otherwise, access
rights issues might
arise due to incon-
sistencies be-
tween secmap
mappings and
mappings stored
in ACLs.
1 Usermapper database
created
2 Usermapper service
enabled
3 Usermapper service
stopped
4 Usermapper database
destroyed
5 Usermapper available
6 Usermapper unreach-
able
Error messages
All event, alert, and status messages provide detailed information and recommended actions
to help you troubleshoot the situation.
To view message details, use any of these methods:
Unisphere software:
Right-click an event, alert, or status message and select to view Event Details, Alert
Details, or Status Details.
CLI:
Use this guide to locate information about messages that are in the earlier-release
message format.
Use the text from the error message's brief description or the message's ID to search
the Knowledgebase on EMC Online Support. After logging in to EMC Online Support,
locate the applicable Support by Product page, and search for the error message.
authentication
/ , , ,
.
CIFS server
+ "(%2 . # ,
"(%2 . $ "(%2 .
CIFS service
"(%2 # ,
, 6- .
Control Station
' 5-7
5-7 .
Data Mover
( 5-7 ,
. 3
.
domain
+ , 6 2
.
. 3
,
. 4 .
domain controller
2
6 . # ,
, , .
See also Windows domain.
Kerberos
, ,
. * -3+, (- ) ,
- , / .
LDAP-based directory
# +# /, # (,4, 2%4, .+# /,
/ ( 2 ) 2 # 2 2 .-$ # 2).
/ 2 ( $ 3 % (($3%)
1%" 2251.
ntxmap
" .
quota
+ ()
/ % 2. 0
.
SFU
See Microsoft Windows Services for UNIX.
user file
1 # ,.
User ID (UID)
- .
Usermapper
2 6 4-(7-
4(# &(#.
Windows domain
, 6 , 6 2
# #-2 .
Windows NT domain
, 6 , 6 -3
2 , -!(.2 . (
6 -3 , (/#") /
2 ,, (!#") -
2 ,.
See also domain and domain controller.
A Internal Usermapper 20
Active Directory
Windows only 24 L
local files 24
C
configuration M
default 22 mapping
multicabinet 23 user IDs, resolution order 19
secondary 23 messages, error 58
settings, modifying 43 Microsoft Windows Services for UNIX (SFU) SFU
(Microsoft Windows Services for UNIX) 16, 32
D multiprotocol environments 16
database, modifying 42
N
E NIS 23, 24
I S
Identity Management for UNIX (IdMU) 16, 32 secondary configuration 23
IdMU 16, 32 SID history 22
importing database information 40 snap-ins, UNIX User Management 25
installation 22
T
tools
UNIX Attribute Migration 26
UNIX User Management 25