7-8 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
81,;([DPSOH
For example, using rsh on the administration host, you can set access rights for a
specific user as follows:
UVKOURRWQILOHUFLIVDFFHVVKRPHMVPLWKU[
In this example, the filer name is filer, the user is jsmith, and the share is home. The
user has read, execute, and browsing rights to the directory on the filer that has been
defined as the home share.
$XWRPDWLQJ$FFHVV5LJKWV
Because you can use CIFS commands through a remote shell program, you can auto-
mate the task of defining access rights for multiple CIFS filers with similar user
information. For example, you can create a script containing CIFS commands to enter
similar user information for each filer at your site.
5HTXLUHG,QIRUPDWLRQLQKRVWVHTXLY)LOH
Make sure that the following entries are added to the hosts.equiv file in the etc
directory:
host user
host root
where host is the host you are using and user is your name.
NOTE: Make sure that you include both lines, or not all remote shell functionality
works properly.
(QDEOLQJ*XHVWDQG*HQHULF$FFHVV
7ZR:D\VWR*LYH$FFHVVWR8QDXWKHQWLFDWHGRU
2FFDVLRQDO8VHUV
You can enable unauthenticated or occasional users to have access to the filer
through CIFS in one of two ways:
For users who are not in a trusted domain, use a guest account.
For users who are authenticated but do not have an entry in the /etc/passwd file
on the filer, use a generic user account.
*XHVW$FFRXQWV
If you are using Windows NT domain authentication, guests are users who are not in
trusted domains.
If you use a UNIX password database for authentication, guests are users who do not
have an entry in the database.