System and method for associating NIS attributes with CIFS clients
First Claim
Patent Images
1. A computer implemented method for associating first attributes of a first protocol with a file, the file previously generated on a storage system and associated with second attributes of a second protocol, the method comprising:
- receiving, over a computer network, a request for the first attributes of the file using the first protocol;
in response to determining that the first attributes of the file do not exist, obtaining the second attributes associated with the file by a server of the first protocol having a server domain name,generating a new name for the first attributes of the first protocol by using the domain name of the server of the first protocol associated with the received request as a domain portion of the new name and a user identifier of the second attributes of the second protocol obtained by the server of the first protocol as a relative identifier of the new name;
generating a new group name for the first attributes of the first protocol by using the domain name of the server of the first protocol associated with the received request as a domain portion of the new group name and a group identifier of the second attributes of the second protocol obtained by the server of the first protocol as a relative identifier of the new group name; and
generating a new access control list for the first attributes based on permission bits of the second attributes and the new name and the new group name; and
sending, in response to the received request, over a computer network, the new name in the first attributes, the new group name in the first attributes and the new access control list to a requesting client.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for associating NIS attributes with CIFS client. Upon requesting attributes by a CIFS client, a CIFS security ID (SID) is generated for the owner and group from the NIS attributes associated with the NIS name. The generated SIDs are returned to the CIFS client. The SIDs are generated using the NIS UID or GID and a CIFS domain associated with the file server storing the referenced file.
17 Citations
33 Claims
-
1. A computer implemented method for associating first attributes of a first protocol with a file, the file previously generated on a storage system and associated with second attributes of a second protocol, the method comprising:
-
receiving, over a computer network, a request for the first attributes of the file using the first protocol; in response to determining that the first attributes of the file do not exist, obtaining the second attributes associated with the file by a server of the first protocol having a server domain name, generating a new name for the first attributes of the first protocol by using the domain name of the server of the first protocol associated with the received request as a domain portion of the new name and a user identifier of the second attributes of the second protocol obtained by the server of the first protocol as a relative identifier of the new name; generating a new group name for the first attributes of the first protocol by using the domain name of the server of the first protocol associated with the received request as a domain portion of the new group name and a group identifier of the second attributes of the second protocol obtained by the server of the first protocol as a relative identifier of the new group name; and generating a new access control list for the first attributes based on permission bits of the second attributes and the new name and the new group name; and sending, in response to the received request, over a computer network, the new name in the first attributes, the new group name in the first attributes and the new access control list to a requesting client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for associating first attributes of a first protocol with a file, the file previously generated on a storage system and associated with second attributes of a second protocol, the system comprising:
-
means for receiving, over a computer network, a request for the first attributes of the file using the first protocol; means for obtaining the second attributes associated with the file by a server of the first protocol having a server domain name in response to determining that the first attributes of the file do not exist, means for generating a new name for the first attributes of the first protocol by using the domain name of the server of the first protocol associated with the received request as a domain portion of the new name and a user identifier of the second attributes of the second protocol obtained by the server of the first protocol as a relative identifier of the new name; means for generating a new group name for the first attributes by using the domain name of the server of the first protocol associated with the received request as a domain portion of the new group name and a group identifier of the second attributes of the second protocol obtained by the server of the first protocol as a relative identifier of the new group name; and means for generating a new access control list for the first set of attributes based on permission bits of the second attributes and the new name and the new group name; and means for sending, in response to the received request, over a computer network, the new name in the first attributes, the new group name in the first attributes and the new access control list to a requesting client. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A computer readable medium containing executable program instructions executed by a processor, comprising:
-
program instructions that receive, over a computer network, a request for a first attributes of a file using the first protocol; program instructions that obtain second attributes associated with the file by a server of the first protocol having a server domain name in response to determining that the first attributes of the file do not exist, program instructions that generate a new name for the first attributes by using the domain name of the server of the first protocol associated with the received request as a domain portion of the new name and a user identifier of the second attributes of the second protocol obtained by the server of the first protocol as a relative identifier of the new name; program instructions that generate a new group name for the first attributes of the first protocol by using the domain name of the server of the first protocol associated with the received request as a domain portion of the new group name and a group identifier of the second attributes of the second protocol obtained by the server of the first protocol as a relative identifier of the new group name; and program instructions that generate a new access control list for the first attributes based on permission bits of the second attributes and the new name and the new group name; and program instructions that send, in response to the received request, over a computer network, the new name in the first attributes, the new group name in the first attributes and the new access control list to a requesting client. - View Dependent Claims (29)
-
-
30. A system for associating first attributes of a first protocol with a file, the file previously generated on a storage system and associated with second attributes of a second protocol, the system comprising:
-
a network adapter to receive a request for the first attributes of the file using the first protocol; a file server storing the file and configured to request the first attributes associated with the file, the file server of the first protocol having a server domain name; a client operatively interconnected with the file server; and a storage operating system executing on the file server, the storage operating system having the server of the first protocol configured to, in response to the first attributes associated with the file not existing; obtain the second attributes associated with the file; generate a new name for the first attributes of the first protocol associated with the received request by using the domain name of the server of the first protocol as a domain portion of the new name and a user identifier of the second attributes of the second protocol obtained by the server of the first protocol as a relative identifier of the new name; generate a new group name for the first attributes of the first protocol associated with the received request by using the domain name of the server of the first protocol as a domain portion of the new group name and a group identifier of the second attributes of the second protocol obtained by the server of the first protocol as a relative identifier of the new group name; and generate a new access control list for the first attributes based on permission bits of the second attributes and the new name and the new group name; and send, in response to the received request, over a computer network, the new name in the first attributes, the new group name in the first attributes and the new access control list to the client. - View Dependent Claims (31, 32, 33)
-
Specification