No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


OceanStor 18500 V3 and 18800 V3 Mission Critical Storage System V300R003 Basic Storage Service Guide for File 16

"This document describes the basic storage services and explains how to configure and managebasic storage services."
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
(Optional) Planning Local Authentication Users

(Optional) Planning Local Authentication Users

When CIFS/FTP/HTTP shares are being matched, different local authentication users or user groups need to be selected for easy user permission control and management.

Local Authentication Users

When planning a local authentication user, you need to pay attention to the following planning items:
  • Username
  • Password and security policies
  • Primary group

    The primary group to which users belong controls the users' permission for CIFS shares. A user must and can only belong to one primary group.

  • Secondary group

    The concepts of primary group and secondary group are for local authentication users and have no relationship with each other. A local authentication user must belong to a primary group but not to a secondary group.


For details about how to create a local authentication user, see Creating a Local Authentication User.

Local Authentication User Groups

A user group consists of different users. You can assign different permissions for different user groups. Then users in the user groups can inherit the permissions of the user groups.

Updated: 2019-08-14

Document ID: EDOC1000084081

Views: 37340

Downloads: 83

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next