Sorry for the slow response, for some reason i'm not getting this list as e-mail. No doubt an error on my part.
Anyway, we have significant cross-platform usage (windows & RHEL). In practice it has been somewhat difficult to make this work well for our users.
Here are our current site best practices.
*) it is critical that you get the mapping of UIDs and GIDs to windows SIDs sorted out at the beginning. This seems obvious, of course. We had an odd situation. Our campus AD has a custom schema (I think) with UID and GID information and other *nix attributes available. However, it does not run services for unix.
We didn't really understand that, and we and the EMC support folks saw the relevant attributes installed in AD, and assumed that the services for unix were running. Turns out that when SFU is not running, the Isilon will not look in AD to see if these attributes are there. Once we figured this out life was easier, but we ended up with a lot of clean-up since UIDs and GIDs got out of sync.
As an aside, you can store the unix attributes in AD, and tell the Isilon to access AD as an LDAP server - that works fine. So we have two "providers" that are both really AD in the back end, but the isilon considers one "AD" and the other "LDAP".
*) you will find this buried deeply in the cross-platform access white paper, so i can't say it's undocumented. However, it is such an obvious thing I feel like it should be written in orange tape on the outside of the box when you get your isilon nodes. Assuming you are using a mixed environment like this, with both AD and LDAP, install a user mapping rule that says "*" is equivalent to "ADDOMAINNAMEHERE\*". Otherwise, the identities that the Isilon gets from AD and LDAP will NOT be considered identical.
*) for anything that has cross-platform usage, make sure that full windows-style ACLs are set from the beginning. When we start with mode bits, bad things happen. I'm not entirely sure why, but it was clear in our environment that this was the case.
*) similarly, on the NFS shares of these directories, have the isilon do permissions checking locally, rather than trusting the group information it gets from the client. You do this via a setting on the NFS export called "Map lookup UID".
*) Once files have ACLs set, the mode bits and user/group ownership displayed via ls on the cluster are mostly irrelevant. Learn to use and love the "-le" flags to ls, which will show you the ACLs.
*) NFSv3 clients see mode bits that are a best approximation of the ACL. THis is described well in the white paper. It is suboptimal in practice.
*) NFSv4 clients can access the full ACLs. On Linux, use nfs4_getfacl and nfs4_setfacl and nfs4_editfacl. This is from the nfs4-acl-tools RPM on RHEL. Remember that NFSv4 access is stateful, so you lose automatic failover by using NFSv4. We are experimenting with mounting both ways - normal access via NFSv3 but a parallel set of NFSv4 mounts.
*) if you are using "access zones", be aware that they are irrelevant for NFS. Whatever IP you connect to, all NFS access takes place in the System access zone. So...make sure your user mapping is set up in the System access zone.
*) if you are used to mode bits, you may find that it takes a while to get used to the ins and outs of windows style ACLs. It took me forever to figure out how to emulate the sticky bit on directories, and I'm not sure I ever got it quite right.
I hope this helps. Feel free to ask if you have questions.