Preparing for CIFS Authentication
Adding an Active-Directory Forest (Kerberos)
3-10 CLI Storage-Management Guide
Adding an Active-Directory Forest (Kerberos)
To prepare for a CIFS service that uses Kerberos to authenticate its clients, you must
first create an Active Directory forest. This mimics the Active Directory (AD) forest
in your Windows network. When a client accesses the CIFS front-end service from
one of the domains in the AD forest, the switch uses this information to locate the
appropriate DC.
You can skip this section if you are not using Kerberos with any CIFS service.
From gbl mode, use the
active-directory-forest command to create a forest:
active-directory-forest forest-name
where forest-name (1-256 characters) is the name of the forest.
For example, the following command creates the ‘medarcv’ forest:
bstnA6k(gbl)# active-directory-forest medarcv
bstnA6k(gbl-forest[medarcv])# . . .
This places you into gbl-forest mode, where you create the various components of the
AD forest. A forest consists of a forest root domain and one or more child domains in
the same domain namespace (for example, “myisp.net” can be a forest root with two
children, “myregion.myisp.net” and “yourregion.myisp.net”). Child domains can also
be parents to more child domains, as dictated by their names (“myregion.myisp.net”
can be the parent of “mylocale.myregion.myisp.net”). If there are trusted trees outside
of this domain namespace (such as “telco.com”), you can add them as tree domains.
Identifying the Forest Root
The next step in creating an Active Directory forest is to identify the DC and domain
Kommentare zu diesen Handbüchern