HP ProLiant Storage Server User Guide (440584-001, February 2007)

creating too many shares also has its drawba cks. For example, if it is sufcient to create a single share
for user home directories, create a “homes share rather than creating separate shares for each user.
By keeping the number of shares and other resources low, the performance of the storage server is
optimized. For example, instead of sharing out each individual user's home directory as its own share,
share out the top -level directory and let the users m ap personal drives to their own subdirectory.
Dening Access Control Lists
TheAccessControlList(ACL)containstheinformationthatdictateswhichusersandgroupshaveaccess
to a share, as well as the type of access that is permitted. Each share on an NTFS le system has one
ACL with multiple associated user permissions. For examp le, an ACL can dene that User1 has read
and write acc
ess to a share, User2 has read only access, and User3 has no access to the share. The
ACL also includes group access information that applies to every user in a congured group. ACLs are
also referred to as permissions.
Integrating local le system security into Windows domain environments
ACLs include properties specic to users and groups from a particular workgroup server or domain
environment. In a multidomain environment, user and group permissions from several domains can apply
to les stored on the same device. Users and groups local to the storage server can be given access
permissions to shares managed by the device. The domain name of the storage server supplies the
context in which the user or group is understood. Permission conguration depend s on the network and
domain infrastructure where the server resides.
File-sharing protocols (except NFS) supply a user and group context for all connections over the network.
(NFS supplies a machine-based context.) When new les are created by those users or machines, the
appropriate ACLs are applied.
Conguration tools provide the ability to share permissions out to clients. These shared permissions are
propagated into a le system ACL, and when n ew les are created over the n et work, the user creating the
le becomes the le owner. In cases where a specic subdirector y of a share has different permissions
from the share itself, the NTFS permissions on the subdirector y apply instead. This method results in a
hierarchical security mo del where the network protocol permissions and the le permissions work together
to provide appropriate security for shares on the device.
NOTE:
Share permissions and le-level permissions are implemented separately. It is possible for les on a
le system to have different permissions from those applied to a share. When this situation occurs, the
le-level permissions override the share permissions.
Comparing ad ministrative ( hidden) and standard shares
CIFS supports both administrative shares a nd standard shares.
Administrative shares are shares with a last character of $. Adm inistrative shares are not included
in the list of shares when a client browses for available shares on a CIFS server.
Standard shares are shares that do not end in a $ character. Standard shares are listed whenever
a CIFS client browses for available shares on a CIF S server .
The storage ser ver supports both administrative and standard CIFS shares. To crea te an ad ministrative
share, end the share name with the $ character when setting up the share. Do not type a $ character at
the end of the share name when creating a standard share.
Managing shares
Shares can be managed using the HP Storage Server Management Console. Tasks include:
Creating a new share
Deleting a s hare
64
File server management