Acopia Networks 810-0044-00 Manual de instalación Pagina 48

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 492
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 47
Preparing for CIFS Authentication
Adding a Proxy User
3-4 CLI Storage-Management Guide
Specifying the Username and Password
The final step in configuring a proxy user is to specify a username and password. This
username/password must belong to the Backup Operators group to ensure that it has
sufficient authority to move files freely from share to share.
From gbl-proxy-user mode, use the
user command to specify the username:
user username
where username (1-64 characters) is a valid username in the proxy-users
domain.
The CLI prompts you for the users password, then prompts to validate the password.
For example, the following command sequence specifies the username, “jqpublic:”
bstnA6k(gbl-proxy-user[acoProxy2])# user jqpublic
Password: jqpasswd
Validate Password: jqpasswd
bstnA6k(gbl-proxy-user[acoProxy2])# ...
Removing the Username and Password
Removing the username from the proxy-user configuration effectively disables the
proxy user. From gbl-proxy-user mode, use
no user to remove the username:
no user
For example:
bstnA6k(gbl)# proxy-user testuser
bstnA6k(gbl-proxy-user[testuser])# no user
bstnA6k(gbl-proxy-user[testuser])# ...
This applies to all back-end filers and shares; a user can be defined as part of the Backup
Operators group on one CIFS filer but not on another.
Vista de pagina 47
1 2 ... 43 44 45 46 47 48 49 50 51 52 53 ... 491 492

Comentarios a estos manuales

Sin comentarios