This section explains how to use Active Directory (AD) for POSIX attributes in Qumulo Core for clusters with multi-protocol access (with NFS and SMB) that manage POSIX and Windows identities from within Active Directory.

How Full Credential Expansion Works in Qumulo Core

Because the SMB and NFS protocols have unique identifiers and exist in different identity domains, it becomes difficult to link the two protocols when they represent the same identity. In addition, storage devices can’t determine the entity that attempts to access a file; as a result, a file that a Linux system writes can be inaccessible on a Windows machine.

One solution to this issue is full credential expansion, which involves mapping the two identities—Windows identities for SMB clients and POSIX identities for NFS clients—by using Active Directory as a central reference. For more information, see RFC 2307 . This approach ensures that, when you use Active Directory to maintain identity mappings from POSIX to Windows, Qumulo Core abides by the mappings.

After you enable Active Directory for POSIX attributes in Qumulo Core, you must enable user identity mapping from your Windows SID to your NFS UID. To do this, assign a user object (SID or objectSid) to every object in Windows and enter the NFS UID of the user as an object attribute. This configuration allows Qumulo Core to correlate an NFS UID (for example, 2053) to a SID on Windows (for example, S-1-5-21-...).

Whenever this user identity is required (for example, to check permissions), Qumulo Core uses the established mapping to retrieve the entire identity for the user by referencing the NFS UIDs and GIDs, and all SIDs, including the group IDs of any relevant parent groups.

Enabling Active Directory for POSIX Attributes in Qumulo Core

This section explains how to enable Active Directory for POSIX attributes in Qumulo Core by using the Web UI and REST API.

To Enable Active Directory for POSIX Attributes by Using the Qumulo Core Web UI

  1. Log in to the Qumulo Core Web UI.

  2. Click Cluster > Active Directory.

  3. On the Active Directory page, do the following:

    1. Enter the details for your Active Directory server.

    2. For Use Active Directory for POSIX Attributes, click Yes.

    3. (Optional) To limit part of the Active Directory tree that Qumulo Core can query, enter a Base DN (Distinguished Name) for User and Group Accounts.

    4. Click Join.

When your cluster joins Active Directory, all SMB sessions and NFS operations result in full credential expansion for every user. For example, when NFS UID 2053 attempts to access a file, the cluster first queries the AD server to:

  • Determine the groups to which the user belongs
  • Map the user and groups to all Windows SIDs
  • Apply permissions based on the fully expanded credential set

This configuration allows Qumulo Core to correlate an NFS UID (for example, 2053) to a SID on Windows (for example, S-1-5-21-...).

To Manage Active Directory for POSIX Attributes by Using the Qumulo Core REST API

To toggle Qumulo Core’s ability to use Active Directory for POSIX attributes, use the fields use_ad_posix_attributes and base_dn for the following REST API endpoints.

  • Get Configuration and Status: /v1/ad/status
  • Get Operation Status: /v1/ad/monitor
  • Join Active Directory: /v1/ad/join

To map identities from one domain to another, use the following REST API endpoints.

  • GID to SIDs: /v1/ad/uids/:gid:/sids
  • Local Username to All Related Identities: /v1/auth/local-username/:username:/related-identities
  • POSIX GID to All Related Identities: /v1/auth/posix-gids/:id:/related-identities
  • POSIX UID to All Related Identities: /v1/auth/posix-uids/:id:/related-identities
  • SID to Expanded Group SIDs: /v1/ad/uids/:gid:/sids
  • SID to GID: /v1/ad/uids/:uid:/gid
  • SID to UID: /v1/ad/uids/:sid:/uid
  • UID to SIDs: /v1/ad/uids/:uid:/sids
  • Windows NT SID to All Related Identities: /v1/auth/sids/:id:/related-identities

To retrieve related identities, use the /v1/auth/auth-ids/:id:/related-identities REST API endpoint.