Got it

[Storage FAQs]How can I perform configuration and verification on the host after ABE is enabled when the storage system creates a CIFS share?

1095 0 3 0 0

Question

How can I perform configuration and verification on the host after Access Based Enumeration (ABE) is enabled when the storage system creates a CIFS share?

Answer

After ABE is enabled, the share directory does not display files or file folders on which the user has no access permission. The following shows accessing a CIFS share on the host in the domain environment (also applicable to local authentication users).

1.         The host accesses the CIFS share created by the storage system successfully. Figure 1-1 shows share access by domain user aduser00.

Figure 1-1 The host accesses the CIFS share created by the storage system

20180813094816123001.png

 

2.         Create file test.txt under the share path. Figure 1-2 shows the result.

Figure 1-2 Create file under the share path

20180813094817759002.png

 

3.         Add permissions to domain users aduser01 and 24aduser1 and remove the default permission of Everyone. If the default permission of Everyone is not removed, all users have full control over the file and can still view the file.

Figure 1-3 shows how to modify the advanced settings of test.txt.

Figure 1-3 Modify the advanced settings

20180813094818994003.png

 

Figure 1-4 shows the advanced security settings before the default permission of Everyone is removed.

Figure 1-4 Before the default permission of Everyone is removed

20180813094819114004.png

 

Figure 1-5 shows the advanced security settings after the default permission of Everyone is removed.

Figure 1-5 After the default permission of Everyone is removed

20180813094819667005.png

 

Figure 1-6 shows the permission settings for domain user aduser01.

Figure 1-6 Permission settings for domain user aduser01

20180813094820880006.png

 

Figure 1-7 shows how to select read data, read attributes, read extended attributes, and read permissions to gain full read permissions.

Figure 1-7 Full read permissions

20180813094821295007.png

 

Figure 1-8 shows the permission settings for domain user 24aduser1.

Figure 1-8 Permission settings for domain user 24aduser1

20180813094822459008.png

 

4.         View and check the files in the share path as domain users aduser01 and 24aduser1. The verification results are as follows:

Figure 1-9 shows the verification results for domain user aduser01.

Figure 1-9 Verification results for domain user aduser01

20180813094823854009.png

 

Figure 1-10 shows the verification results for domain user 24aduser1.

Figure 1-10 Verification results for domain user 24aduser1

20180813094824146010.png

 

 


This post was last edited by Chrisxl at 2018-08-13 02:00.

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.