A number of alternative authentication subsystem types
exist for the most commonly used authentication protocols. These are each
identified by a unique type name.
The following table shows the authentication subsystem types supplied with SkyVault and the optional features they support.
Type | Description | Single sign-on (SSO) support | CIFS authentication | User registry entry |
---|---|---|---|---|
SkyVaultNtlm | Native SkyVault authentication | Yes, NTLM | Yes | No |
ldap | Authentication and user registry export through the LDAP protocol (for example, OpenLDAP) | No | No | Yes |
ldap-ad | Authentication and user registry export from Active Directory through the LDAP protocol | No | No | Yes |
passthru | Authentication through a Windows domain server | Yes, NTLM | Yes | No |
kerberos | Authentication through a Kerberos realm | Yes, SPNEGO | Yes | No |
external | Authentication using an external SSO mechanism | Yes | No | No |
Important: If you configure a single authentication subsystem
of a type that does not support CIFS authentication (for example, LDAP),
then the CIFS server will be automatically disabled. If you want CIFS and
LDAP, then you must set up an authentication chain.
Important: Support for Microsoft Office depends on the authentication mechanism
provided by the external subsystem. See How is Microsoft SharePoint support related to external authentication? for more information.
Note: If you are using a proxy (load balancer) with Kerberos authentication, either:
- Use the external authentication subsystem on SkyVault and set up the proxy to implement kerberos
- Set up the kerberos authentication subsystem on SkyVault and create the Service Principal Name (SPN) in Active Directory to include the proxy DNS name