Securing Data
UNIX Files Accessed by NT Clients
8-10
UNIX Files Accessed by NT Clients
When an NT user accesses a UNIX file, the UNIX file permissions are
translated into an ACL that then determines the permissions to grant.
Recall from “HP NetStorage 6000 Security in a UNIX-only Environment”
on page 8-1 that permissions are granted to three distinct groups:
n
user
n
group
n
other
If the owner of the UNIX file does not map to a user in the NT domain, then
an NT user ID is generated in the local UNIX domain. If the owner of the
UNIX file is recognized (or mapped) as a known NT user, then the
appropriate information is exchanged so that the owner has the same
security privileges in NT as in UNIX. A similar process occurs for the
group identification and permissions. The Other field is mapped to the NT
Everyone account. The table below shows the mapping that takes place
between the permissions in UNIX and NT.
Note
If the UNIX file is modified by an NT client, then the file becomes an NT
file.
UNIX
NT Equivalent
r--
Read
-w-
Write, Delete
--x
Execute
-wx
Write, Delete, Execute
r-x
Read, Execute
rw-
Read, Write, Delete
rwx
Full Access
---
No Access
Содержание NetStorage 6000
Страница 1: ...HP SureStore NetStorage 6000 User s Guide ...
Страница 7: ...Table of Contents 5 ...
Страница 14: ...Overview HP NetStorage 6000 Hardware 1 7 Figure 1 4 Expanding File Volumes ...
Страница 23: ...The Identity Tab 2 2 ...
Страница 93: ...Monitoring the System Viewing System Activity 6 8 ...
Страница 95: ...Reporting The Report Tab 7 2 ...
Страница 111: ...Securing Data Modifying Map Files 8 16 ...
Страница 117: ...Contacting Support and Upgrading Upgrading the HP NetStorage 6000 9 6 ...
Страница 131: ...Integrating with Management Applications ManageX Integration 10 14 ...
Страница 163: ...System Specifications Replacements and Upgrades C 12 ...
Страница 165: ...Telnet Information D 2 ...