Mounting Kerberos-enabled File Systems

Consider the following scenarios when mounting File Storage Kerberos-enabled file systems.

Mounting a file system that uses Kerberos authentication requires additional consideration for root, administrator, and anonymous access depending the user mounting the file system. Mounting the file system as one of these users might require updates to NFS export options.

Note

Regardless of the user mounting the file system, use the fully qualified domain name (FQDN) of the mount target instead of the IP address when mounting the file system.

Mounting a File System as the Linux Root User

In Linux, when root user is used for mounting the file system, the NFS client searches keytab for principals in the following order:

  1. <HOSTNAME>$@<REALM>
  2. root/<hostname>@<REALM>
  3. nfs/<hostname>@<REALM>
  4. host/<hostname>@<REALM>

After the NFS client gets the ticket for one of these principals, that ticket is presented to mount target. If anonymous access isn't enabled for the export, at least one of the preceding users is required to exist in the LDAP server where they're mapped to UID and GID. If root access is preferred, map the users to UID/GID 0.

Access requests fail if a user matching <HOSTNAME>$, root, nfs, or host isn't available in LDAP and anonymous access isn't enabled for export. Use the klist command to verify that one of these users is present on the client.

For more information, see LDAP Lookups and Anonymous Access.

Mounting a File System As a Windows User

In Windows, the user that accesses the file system is the user that mounts the file system. The principal used to mount the file system is <username>@<REALM>.

If administrator access is required to the File Storage export, map the respective user to UID/GID 0 using the LDAP server.