isi auth mapping token -v --name=username gives a more comprehensive picture IMO.
You don't have set any explicit mapping rules configured on the Isilon?
The AD is bound in which zone?
Those listed groups GROUPS={GID:27, GID:8888, [...] , GID:2000586118} are (only) the first 16 unix groups
from the NFS request?
--
You received this message because you are subscribed to the Google Groups "Isilon Technical User Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isilon-user-gr...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
That was suppose to be --name not username sorry bout that
On Wednesday, October 9, 2013, Keith Nargi wrote:
--
Keith
--
You received this message because you are subscribed to the Google Groups "Isilon Technical User Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isilon-user-gr...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
When you do the isi auth mapping token make sure you include the domain with the user nameIsi auth mapping token --username=mydomain\\knargi will show you both uid and Sid if the user is in that ad
On Wednesday, October 9, 2013, Dan Pritts wrote:
--
Keith
--
You received this message because you are subscribed to the Google Groups "Isilon Technical User Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isilon-user-gr...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
With that, I am told that there is no such user.isi auth mapping token -v --name=username gives a more comprehensive picture IMO.
Unless, of course, I prime the cache with the same good old
isi auth mapping --source-user=username
which picks it all up from AD.
No mapping rules. The usernames in AD are unix-compatible, and AD has all the information we need - users, uids, groups, gids. It mostly works, except for this one little wrinkle.
You don't have set any explicit mapping rules configured on the Isilon?
All of them, actually.The AD is bound in which zone?
yes.
Those listed groups GROUPS={GID:27, GID:8888, [...] , GID:2000586118} are (only) the first 16 unix groups
from the NFS request?
isi auth mapping token -v --name=username
gives a more comprehensive picture IMO.
You don't have set any explicit mapping rules configured on the Isilon?
The AD is bound in which zone?
Those listed groups GROUPS={GID:27, GID:8888, [...] , GID:2000586118} are (only) the first 16 unix groups
from the NFS request?
It might be simply the case that --map-lookup-uid (NFS) doesn't work with AD in a separate zone...
-- Peter
Hi all -
I'm trying to use --map-lookup-uid to have the isilon look up group memberships itself, rather than using the group membership sent as part of the NFS request.
I've got an immediate need for this: a user in more than 16 unix groups. Also, I want to do this going forward so that we can just maintain groups in AD and not worry about it on Linux.
The --map-lookup-uid setting is working properly.
However....
We have a campus-wide Active Directory forest that i've bound the Isilon cluster to. The cluster has no other authentication providers configured, except for mostly-empty "LOCAL" and "FILES" providers.
uidNumber and gidNumber are available in AD.
things work fine if I prime the auth mapping cache with:
isi auth mapping list --source-user username
This populates the cache so that system knows about the UID<=>username mapping. The user can write to folders that he's acl'd to, etc.
If i then
isi auth mapping flush --all
the user is no longer able to write to said folders.
/var/log/lsassd.log then has something like the following:
lsassd[7817]: [lsass] Failed to map token token={UID:3291, GID:2000586020, GROUPS={GID:27, GID:8888, [...] , GID:2000586118}, zone id=-1 }: Failed to lookup uid 3291: LW_ERROR_NO_SUCH_USER
So...my question is, how do I get the system to look in AD to do that UID lookup?
I have tried this:
isi auth ads modify MYDOMAIN --nss-enumeration true
isi auth ads reload
Unfortunately, it doesn't seem to have made any difference.
I can do an LDAP query against AD, directly, and it will do this sort of lookup.
Any thoughts?
thanks
danno
--
You received this message because you are subscribed to the Google Groups "Isilon Technical User Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isilon-user-gr...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
Yeah, that works. thanks.
Doesn't really affect my issue, though - to be clear, my problem is that UIDS are not getting mapped back to names. The name->uid mapping works fine.
thanks
danno
Keith Nargi October 9, 2013 9:40 PM
That was suppose to be --name not username sorry bout that
On Wednesday, October 9, 2013, Keith Nargi wrote:
--
Keith
--
You received this message because you are subscribed to the Google Groups "Isilon Technical User Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isilon-user-group+un...@googlegroups.com.
To unsubscribe from this group and stop receiving emails from it, send an email to isilon-user-group+un...@googlegroups.com.
An excellent start for more info is the recent sessionAsk the Expert: AIMA: Everything you wanted to know but were afraid to ask.(Authentication, Identity Management, and Authorization)It has pointers to relevant docs (however, the promisedAIMA idmapper paper isn't available yet) and alsoTim Wright's excellent introduction and and further postings are well worth reading.For example it becomes clear that "mappings" are what is effective nowand live the the cache. But they are created from "rules" which are permanent(configurable). This explains your experience at least partly.If you can pull the desired gid lookups into the cache manually,but not "on the fly" by an NFS request, that would makefor an SR call I think.-- Peter--
You received this message because you are subscribed to the Google Groups "Isilon Technical User Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isilon-user-gr...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
Yeah, that works. thanks.
Doesn't really affect my issue, though - to be clear, my problem is that UIDS are not getting mapped back to names. The name->uid mapping works fine.
thanks
danno
That was suppose to be --name not username sorry bout that
On Wednesday, October 9, 2013, Keith Nargi wrote:
--
Keith
--
You received this message because you are subscribed to the Google Groups "Isilon Technical User Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isilon-user-gr...@googlegroups.com.
To unsubscribe from this group and stop receiving emails from it, send an email to isilon-user-group+un...@googlegroups.com.