Thank you all for your help. I was also working with support and we managed to come across the solution. While it is not ideal, it definitely works. After mapping the AD identity to the LDAP identity all that was needed was to change the ACL policy setting to use BSD semantics which forces the GID to be inherited from the parent folder.
The benefits - this drops the annoying primary group that is coming from AD. Coming in from Windows SMB works terrific. CIFS mount and NFS also behave as the Isilon now agrees the user is the same person.
The costs - A massive number of user joins will have to be scripted. Since the user inherits the parent folder owner, this works fine for /project space, but not so well for /home. I will have to script a user dir creation with a chgrp to the correct private GID.
I don't know if at load, the Isilon will struggle with 3000 mapping rules or not. The scripting is not awful once I get it correct but I do hear the API is dog slow so I will have to use a local script with a cron. Not perfect, but serviceable.
I don't know that I can pinpoint the exact issue based on what you are describing, however I did find a document that may help you find what you are looking for.
Identities, Access-Tokens, and the Isilon OneFS User Mapping Service
Good question! Since we are not at the deployment phase, I just explored user mapping within the web interface where I explicitly lookup a user from both authentication providers. If a wildcard rule that maps all users from AD to all users from LDAP could work, then I imagine any user accessing the box receives this mapping rule and all would be well.
I could see how that could work for user space, but not sure how that would work with project space where members of a group would need rwxrws--- permissions. Can you elaborate on how this would behave coming from the same user on a Linux box, then connecting from a Windows box?
abqkawi1000
7 Posts
1
July 13th, 2016 06:00
Thank you all for your help. I was also working with support and we managed to come across the solution. While it is not ideal, it definitely works. After mapping the AD identity to the LDAP identity all that was needed was to change the ACL policy setting to use BSD semantics which forces the GID to be inherited from the parent folder.
The benefits - this drops the annoying primary group that is coming from AD. Coming in from Windows SMB works terrific. CIFS mount and NFS also behave as the Isilon now agrees the user is the same person.
The costs - A massive number of user joins will have to be scripted. Since the user inherits the parent folder owner, this works fine for /project space, but not so well for /home. I will have to script a user dir creation with a chgrp to the correct private GID.
I don't know if at load, the Isilon will struggle with 3000 mapping rules or not. The scripting is not awful once I get it correct but I do hear the API is dog slow so I will have to use a local script with a cron. Not perfect, but serviceable.
chughh27
39 Posts
0
July 11th, 2016 03:00
Hello,
What is the sequence of creating the user ?
Also if you can flush current mapping..
Thanks
Chughh
sjones51
252 Posts
0
July 12th, 2016 12:00
Hi abqkawi1000,
I don't know that I can pinpoint the exact issue based on what you are describing, however I did find a document that may help you find what you are looking for.
Identities, Access-Tokens, and the Isilon OneFS User Mapping Service
https://support.emc.com/docu50075
If you don't find the answer you are looking for, Isilon Support may be able to help you dive deeper into this.
https://support.emc.com/servicecenter/createSR
Peter_Sero
4 Operator
•
1.2K Posts
0
July 13th, 2016 02:00
How is the SMB share configured?
isi smb shares view SHARENAME
watch out for ==> Create Permissions: ....
-- Peter
sluetze
2 Intern
•
300 Posts
1
July 13th, 2016 23:00
Instead of scripting a new owner for /home/ you could just modify the default permissions to 700 and the group can be whatever it will...
Peter_Sero
4 Operator
•
1.2K Posts
1
July 14th, 2016 05:00
Can you share some more details on those mapping rules? Why can't wildcards be used?
abqkawi1000
7 Posts
0
July 14th, 2016 09:00
Good question! Since we are not at the deployment phase, I just explored user mapping within the web interface where I explicitly lookup a user from both authentication providers. If a wildcard rule that maps all users from AD to all users from LDAP could work, then I imagine any user accessing the box receives this mapping rule and all would be well.
Any ideas on what this would look like?
abqkawi1000
7 Posts
0
July 14th, 2016 09:00
I could see how that could work for user space, but not sure how that would work with project space where members of a group would need rwxrws--- permissions. Can you elaborate on how this would behave coming from the same user on a Linux box, then connecting from a Windows box?
Peter_Sero
4 Operator
•
1.2K Posts
1
July 15th, 2016 02:00
The ultimate reference is
https://www.emc.com/collateral/white-papers/h12417-identities-access-tokens-isilon-onefs-user-mapping-service-wp.pdf
without which any experimenting with user mappings is quite a challenge...
I also find working with mapping rules is easier on the command line (CLI)
than in the Web interface.
In particular, if you have found a working per-user mapping already,
viewing it in the CLI as plain text should immediately lead to the
correct general form using wildcards -- if in doubt, just share it here.
In the end the general rule might look like
CORP\* += * [group]
or
CORP\* &= *
but let's see what exact per-user mapping you have found to work already.
-- Peter
abqkawi1000
7 Posts
0
July 15th, 2016 13:00
Terrific! Thank you for pointing me in this direction. I will play with this and post my findings.
abqkawi1000
7 Posts
0
August 5th, 2016 14:00
I was successful using the OneFS UI to create the user mapping rule
User Mapping Tab
Create rule - Join two users together
Join this user (for the LDAP user)
*
With this user (for my AD side)
DOMAIN\*
Just that easy and it works with for us nicely with the BSD semantics enabled.