PowerStore: Slik aktiverer du SFTP-passordløs pålogging på SMB bare NAS-server

Summary: Denne artikkelen veileder deg for å aktivere SFTP-passordløs pålogging for SMB-kontoen på SMB-NAS-server for PowerStore.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

  1. Generer et SSH-nøkkelpar på en hvilken som helst Linux-server

    [administrator@my-linux-server ~]$ ssh-keygen -t rsa
    Generating public/private rsa key pair.
    Enter file in which to save the key (/home/administrator/.ssh/id_rsa):
    Enter passphrase (empty for no passphrase):
    Enter same passphrase again:
    Your identification has been saved in /home/administrator/.ssh/id_rsa.
    Your public key has been saved in /home/administrator/.ssh/id_rsa.pub.
    The key fingerprint is:
    SHA256:FGwVwmaboco...GC86v+4pc administrator@my-linux-server
    The key's randomart image is:
    +---[RSA 3072]----+
    |     . =+o+o     |
    |    . + @o.      |
    | o + . O.*       |
    |* . = +.B        |
    |.= + o =So       |
    |o . . o . .      |
    |o. o ..          |
    |+ +..E           |
    |   :)            |
    +----[SHA256]-----+

    Dette er hva du bør se i .ssh-mappen:

    [administrator@my-linux-server .ssh]# ls /home/administrator/.ssh/
    id_rsa
    id_rsa.pub
    known_hosts
  2. Opprett en SMB NAS-server, Windows AD ble med

    For eksempel NAS-server nas-sftp01:
    SMB-server-fane

    NFS er ikke nødvendig
    NFS-server-fanen

    Innstillinger for SFTP:

    • SFTP aktivert
    • FTP/SFTP-servertilgang: SMB-brukere
    • Begrensning for hjemmekatalog: Enabled (Aktivert)
    Et skjermbilde av en datamaskinBeskrivelse automatisk generert

    "Home Directory Restriction" lar brukeren bare åpne /Home/-mappen, men ikke se noe over dette. Fjern merket for dette hvis brukeren skal ha tilgang til roten til NAS-serveren og filsystemene.

  3. Opprette et filsystem

    Opprett et filsystem under NAS-serveren som ble opprettet ovenfor, og opprett en delt SMB-ressurs.
    Eksempel på filsystemnavn: nas-sftp-fs01.
    Filsystemdetaljer

  4. Aktiver HomeDir for NAS-server nas-SFTP01

    Last opp homedir-konfigurasjonsfilen til NAS-serverens > navngivningstjenester > Lokale filer.

    Merk at du bare setter filsystemnavnet her nas-sftp-fs01. Bruk denne malen for veiledning:

     

    Examples:
    mydomain:*:/fs2/<d>/<u>:regex:create
    mydomain:usr1:/fs1/usr1
    !:tom:/fs1/tom
    test:*:/nas-sftp-fs01/<d>/<u>:regex:create
  5. Opprette en bruker på Windows AD

    Demonstrerer med brukertester som eksempel.
    Logg på fra en hvilken som helst Windows-klient (Windows AD Joined) med brukertester og få tilgang til hjemmekatalogen \\nas-sftp01\HOME for å opprette hjemmekatalogen til brukertesteren.

  6. Gå til Linux-serveren du opprettet SSH-nøkkelparet på, og gå til stedet der nøkkelen er lagret.

    Du må gi nytt navn til filen id_rsa.pub for å autorized_keys

    [administrator@my-linux-server]$ cd /home/administrator/.ssh/
    [administrator@my-linux-server .ssh]$ pwd
    /home/administrator/.ssh
    
    [administrator@my-linux-server .ssh]$ ls -la
    total 16
    drwx------.  2 administrator administrator   57 Mar  4 09:58 .
    drwx------. 20 administrator administrator 4096 Jan 23 08:21 ..
    -rw-------.  1 administrator administrator 2622 Mar  3 08:19 id_rsa
    -rw-r--r--.  1 administrator administrator  582 Mar  3 08:19 id_rsa.pub
    -rw-r--r--.  1 administrator administrator  909 Mar  4 08:34 known_hosts
    
    [administrator@my-linux-server .ssh]$ mv id_rsa.pub authorized_keys
  7. Åpne en sftp-tilkobling til NAS-serveren med den nyopprettede brukeren

    Opprett en .ssh-mappe og flytt den nye filen authorized_keys til .ssh / mappen fra plasseringen ovenfor (i dette eksemplet er dens / home / administrator / .ssh /).

    Erstatt xx.xx.xx.xx med NAS-serverens IP eller navn.

     

    [administrator@my-linux-server .ssh]$ sftp test\\tester@xx.xx.xx.xx
    test\tester@xx.xx.xx.xx's password:
    Connected to xx.xx.xx.xx.
    sftp>
    
    sftp> mkdir .ssh
    
    sftp> cd .ssh/
    
    sftp> put /home/administrator/.ssh/authorized_keys
    Uploading /home/administrator/.ssh/authorized_keys to /.ssh/authorized_keys
    /home/administrator/.ssh/authorized_keys                  100%  582   863.0KB/s   00:00
    sftp> ls -la
    drwxrwxrwx   2 2147483653 2147483653 2147483653            152 Mar  4 10:19 .
    drwxr-xr-x   3 2147483653 2147483653 2147483653            152 Mar  4 10:19 ..
    -rw-r--r--   1 2147483653 2147483653 2147483653            582 Mar  4 10:19 authorized_keys
  8. Angi tillatelse 700 til mappe .ssh og 600 til fil .ssh / authorized_keys ved hjelp av chmod i SFTP

    sftp> ls -la
    drwxr-xr-x   3 2147483650 2147483650 2147483650           8192 Mar  4 12:30 .
    drwxr-xr-x   3 2147483650 2147483650 2147483650           8192 Mar  4 12:30 ..
    drwxrwxrwx   2 2147483650 2147483650 2147483650            152 Mar  4 12:30 .ssh
    -rw-r--r--   1 2147483650 2147483650 2147483650              9 Mar  4 12:22 TESTER_HOME_dir.txt
    
    sftp> chmod 700 .ssh/
    Changing mode on /.ssh/
    sftp> chmod 600 .ssh/authorized_keys
    Changing mode on /.ssh/authorized_keys
    sftp> ls -la
    drwxr-xr-x   3 2147483650 2147483650 2147483650           8192 Mar  4 12:30 .
    drwxr-xr-x   3 2147483650 2147483650 2147483650           8192 Mar  4 12:30 ..
    drwx------   2 2147483650 2147483650 2147483650            152 Mar  4 12:30 .ssh
    -rw-r--r--   1 2147483650 2147483650 2147483650              9 Mar  4 12:22 TESTER_HOME_dir.txt
    
    sftp> cd .ssh/
    sftp> ls -la
    drwx------   2 2147483650 2147483650 2147483650            152 Mar  4 12:30 .
    drwxr-xr-x   3 2147483650 2147483650 2147483650           8192 Mar  4 12:30 ..
    -rw-------   1 2147483650 2147483650 2147483650            582 Mar  4 12:30 authorized_keys
  9. Testtilgang

    Du skal nå kunne åpne sftp uten å oppgi passord.
    Du kan bruke alternativet sftp -v for å vise påloggingsdetaljene.

    [administrator@my-linux-server .ssh]$ sftp -v test\\tester@xx.xx.xx.xx
    OpenSSH_8.0p1, OpenSSL 1.1.1k  FIPS 25 Mar 2021
    debug1: Reading configuration data /etc/ssh/ssh_config
    debug1: Reading configuration data /etc/ssh/ssh_config.d/05-....conf
    debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
    debug1: configuration requests final Match pass
    debug1: re-parsing configuration
    debug1: Reading configuration data /etc/ssh/ssh_config
    debug1: Reading configuration data /etc/ssh/ssh_config.d/05-....conf
    debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
    debug1: Connecting to xx.xx.xx.xx [xx.xx.xx.xx] port 22.
    debug1: Connection established.
    debug1: identity file /home/administrator/.ssh/id_rsa type -1
    debug1: identity file /home/administrator/.ssh/id_rsa-cert type -1
    debug1: identity file /home/administrator/.ssh/id_dsa type -1
    debug1: identity file /home/administrator/.ssh/id_dsa-cert type -1
    debug1: identity file /home/administrator/.ssh/id_ecdsa type -1
    debug1: identity file /home/administrator/.ssh/id_ecdsa-cert type -1
    debug1: identity file /home/administrator/.ssh/id_ed25519 type -1
    debug1: identity file /home/administrator/.ssh/id_ed25519-cert type -1
    debug1: identity file /home/administrator/.ssh/id_xmss type -1
    debug1: identity file /home/administrator/.ssh/id_xmss-cert type -1
    debug1: Local version string SSH-2.0-OpenSSH_8.0
    debug1: Remote protocol version 2.0, remote software version OpenSSH_8.4
    debug1: match: OpenSSH_8.4 pat OpenSSH* compat 0x04000000
    debug1: Authenticating to xx.xx.xx.xx:22 as 'test\\tester'
    debug1: SSH2_MSG_KEXINIT sent
    debug1: SSH2_MSG_KEXINIT received
    debug1: kex: algorithm: curve25519-sha256
    debug1: kex: host key algorithm: ecdsa-sha2-nistp256
    debug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: <implicit> compression: none
    debug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: <implicit> compression: none
    debug1: kex: curve25519-sha256 need=32 dh_need=32
    debug1: kex: curve25519-sha256 need=32 dh_need=32
    debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
    debug1: Server host key: ecdsa-sha2-nistp256 SHA256:xyc9xUOiKbYg4TEvY8wahgq9ous3ocRTbTWBEmK5wgk
    debug1: Host 'xx.xx.xx.xx' is known and matches the ECDSA host key.
    debug1: Found key in /home/administrator/.ssh/known_hosts:6
    debug1: rekey out after 4294967296 blocks
    debug1: SSH2_MSG_NEWKEYS sent
    debug1: expecting SSH2_MSG_NEWKEYS
    debug1: SSH2_MSG_NEWKEYS received
    debug1: rekey in after 4294967296 blocks
    debug1: Will attempt key: /home/administrator/.ssh/id_rsa
    debug1: Will attempt key: /home/administrator/.ssh/id_dsa
    debug1: Will attempt key: /home/administrator/.ssh/id_ecdsa
    debug1: Will attempt key: /home/administrator/.ssh/id_ed25519
    debug1: Will attempt key: /home/administrator/.ssh/id_xmss
    debug1: SSH2_MSG_EXT_INFO received
    debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256
    ,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com>
    debug1: SSH2_MSG_SERVICE_ACCEPT received
    debug1: Authentications that can continue: publickey,password
    debug1: Next authentication method: publickey
    debug1: Trying private key: /home/administrator/.ssh/id_rsa
    debug1: Authentication succeeded (publickey).
    Authenticated to xx.xx.xx.xx ([xx.xx.xx.xx]:22).
    debug1: channel 0: new [client-session]
    debug1: Requesting no-more-sessions@openssh.com
    debug1: Entering interactive session.
    debug1: pledge: network
    debug1: Sending environment.
    debug1: Sending env LANG = en_IE.UTF-8
    debug1: Sending subsystem: sftp
    Connected to xx.xx.xx.xx.
    sftp> ls
    TESTER_HOME_dir.txt

 

Affected Products

PowerStore 1200T

Products

PowerStore, PowerStore 3200Q, PowerStore 3200T, PowerStore 500T, PowerStore 5200T, PowerStore 9200T, PowerStore Employee and Partner
Article Properties
Article Number: 000276740
Article Type: How To
Last Modified: 04 Apr 2025
Version:  4
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.