System and method for associating NIS attributes with CIFS clients
First Claim
Patent Images
1. A computer implemented method comprising:
- receiving, at a storage server comprising a processor and associated with a first protocol having a server domain name, a query for first attributes of a data structure using the first protocol, the data structure previously generated on the storage server and associated with second attributes of a second protocol, wherein the first protocol and the second protocol are different;
determining that the first attributes of the first protocol for the data structure do not exist, as the data structure was previously generated and associated with the second attributes of the second protocol;
in response to the first attributes of the first protocol for the data structure not existing, determining whether the first attributes of the first protocol for the data structure can be mapped from the second attributes of the second protocol for the data structure; and
in response to determining that the first attributes of the first protocol cannot be mapped from the second attributes of the second protocol, generating, by the storage server, a new name for the first attributes of the first protocol using the domain name of the server of the first protocol associated with the query as a domain portion of the new name, and a user identifier of the second attributes of the second protocol as a relative identifier of the new name.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for associating NIS attributes with CIFS client. Upon requesting attributes by a CIFS client, a CIFS security ID (SID) is generated for the owner and group from the NIS attributes associated with the NIS name. The generated SIDs are returned to the CIFS client. The SIDs are generated using the NIS UID or GID and a CIFS domain associated with the file server storing the referenced file.
-
Citations
20 Claims
-
1. A computer implemented method comprising:
-
receiving, at a storage server comprising a processor and associated with a first protocol having a server domain name, a query for first attributes of a data structure using the first protocol, the data structure previously generated on the storage server and associated with second attributes of a second protocol, wherein the first protocol and the second protocol are different; determining that the first attributes of the first protocol for the data structure do not exist, as the data structure was previously generated and associated with the second attributes of the second protocol; in response to the first attributes of the first protocol for the data structure not existing, determining whether the first attributes of the first protocol for the data structure can be mapped from the second attributes of the second protocol for the data structure; and in response to determining that the first attributes of the first protocol cannot be mapped from the second attributes of the second protocol, generating, by the storage server, a new name for the first attributes of the first protocol using the domain name of the server of the first protocol associated with the query as a domain portion of the new name, and a user identifier of the second attributes of the second protocol as a relative identifier of the new name. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer readable medium containing executable program instructions executed by a processor, comprising:
-
program instructions that receive, at a storage server of a first protocol having a server domain name, a query for first attributes of a data structure using the first protocol, the data structure previously generated on the storage server and associated with second attributes of a second protocol, wherein the first protocol and the second protocol are different; program instructions that determine that the first attributes of the first protocol for the data structure do not exist, as the data structure was previously generated and associated with the second attributes of the second protocol; program instructions that determine whether the first attributes of the first protocol for the data structure can be mapped from the second attributes of the second protocol for the data structure, in response to determining that the first attributes of the data structure do not exist; and program instructions that generate a new name for the first attributes of the first protocol using the domain name of the server of the first protocol associated with the query as a domain portion of the new name, and a user identifier of the second attributes of the second protocol as a relative identifier of the new name in response to determining that the first attributes of the first protocol cannot be mapped from the second attributes of the second protocol. - View Dependent Claims (10, 11, 12)
-
-
13. A system comprising:
-
a storage server comprising a processor and associated with a first protocol having a server domain name configured to receive at a network adapter of the storage server a query for first attributes of a data structure using the first protocol the storage server further configured to determine that the first attributes of the first protocol for the data structure do not exist as the data structure was previously generated and associated with the second attributes of a second protocol, wherein the first protocol and the second protocol are different; and the storage server further configured to determine whether the first attributes of the first protocol for the data structure can be mapped from the second attributes of the second protocol for the data structure in response to determining that the first attributes of the data structure do not exist; and the storage server further configured to generate a new name for the first attributes of the first protocol using the domain name of the storage server of the first protocol associated with the received query as a domain portion of the new name, and a user identifier of the second attributes of the second protocol as a relative identifier of the new name, in response to determining that the first attributes of the first protocol cannot be mapped from the second attributes of the second protocol. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification