Veritas Access Administrator's Guide
- Section I. Introducing Veritas Access
- Section II. Configuring Veritas Access
- Adding users or roles
- Configuring the network
- Configuring authentication services
- Section III. Managing Veritas Access storage
- Configuring storage
- Configuring data integrity with I/O fencing
- Configuring ISCSI
- Veritas Access as an iSCSI target
- Configuring storage
- Section IV. Managing Veritas Access file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Veritas Access as a CIFS server
- About Active Directory (AD)
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Configuring an FTP server
- Using Veritas Access as an Object Store server
- Configuring the NFS server
- Section V. Monitoring and troubleshooting
- Section VI. Provisioning and managing Veritas Access file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VII. Configuring cloud storage
- Section VIII. Provisioning and managing Veritas Access shares
- Creating shares for applications
- Creating and maintaining NFS shares
- Creating and maintaining CIFS shares
- Using Veritas Access with OpenStack
- Integrating Veritas Access with Data Insight
- Section IX. Managing Veritas Access storage services
- Compressing files
- About compressing files
- Compression tasks
- Configuring SmartTier
- Configuring SmartIO
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Veritas Access continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Compressing files
- Section X. Reference
Setting up Kerberos authentication for NFS clients
Kerberos provides a secure way of authenticating NFS clients. In this configuration, the Veritas Access server behaves as a Kerberos client. The Kerberos KDC (Key Distribution Center) server must already be set up and running outside of Veritas Access. For NFS version 3, when a Veritas Access share is exported with the krb5 security option, the NFS clients have to mount the Veritas Access share with the krb5 mount option. Otherwise the mount fails with an authentication error. For NFS version 4, the NFS clients automatically find the security type and mount the Veritas Access share with the same mount option.
Note:
When CIFS security is configured with ads, Kerberos for NFS cannot be configured. When NFS is configured for Kerberos authentication, CIFS security cannot be configured with ads.
To configure Veritas Access for authenticating NFS clients using Kerberos, perform the tasks in the order that is listed in Table: Tasks for configuring Veritas Access for authenticating NFS clients using Kerberos.
Table: Tasks for configuring Veritas Access for authenticating NFS clients using Kerberos
Task | Where to find more information |
---|---|
Add and configure Veritas Access to the Kerberos realm | See Adding and configuring Veritas Access to the Kerberos realm. |
Configure the NFS server for ID mapping | See Configuring Veritas Access for ID mapping for NFS version 4. |
Configure the NFS client for ID mapping | See Configuring the NFS client for ID mapping for NFS version 4. |
Exporting an NFS share for Kerberos authentication | |
Mount the NFS share from the NFS client | See Mounting an NFS share with Kerberos security from the NFS client. |