White Paper - File Sharing Security
Copyright © 2000 Hewlett-Packard Company Page 2 of 28
All Rights Reserved
Table of Contents
1 Introduction__________________________________________________ 4
2 Security on UNIX Networks ______________________________________ 4
2.1 General Overview ___________________________________________ 4
2.2 Restricting User Access ________________________________________ 5
2.3 Restricting Host Access ________________________________________ 6
2.4 Considerations for the HP NetStorage 6000 _________________________ 6
2.4.1 Trusted Hosts __________________________________________________________6
2.4.2 The /etc Directory ______________________________________________________7
2.4.3 The /etc/approve File ___________________________________________________7
3 Security on Windows Networks ___________________________________ 8
3.1 General Overview ___________________________________________ 8
3.2 Share Level Security __________________________________________ 9
3.3 User Level Security ___________________________________________ 9
3.3.1 NT Domains __________________________________________________________10
3.3.2 User Authentication _____________________________________________________12
3.3.3 Password Maintenance and Encryption _____________________________________13
3.3.4 Security Descriptors_____________________________________________________14
3.4 Considerations for the HP NetStorage 6000 ________________________ 16
3.4.1 Share Level Security ____________________________________________________16
3.4.2 User Level Security _____________________________________________________16
3.4.3 DOS attributes ________________________________________________________17
4 Security on Mixed (UNIX/Windows) Networks_______________________ 17
4.1 General Overview __________________________________________ 17
5 File Sharing Configuration ______________________________________ 18
5.1 File Volume Permissions _______________________________________ 18
5.2 Mapping Strategies _________________________________________ 19
5.2.1 User Mapping_________________________________________________________20
5.2.2 Group Mapping_______________________________________________________20
6 Mapping Clients _____________________________________________ 20
6.1 Mapping Files _____________________________________________ 21
6.2 Establishing a Windows Client__________________________________ 22
6.3 Establishing a UNIX Client_____________________________________ 24