5.6. Verifying that an IdM user can access NFS shares on an IdM client
As an Identity Management (IdM) system administrator, you can test if an IdM user that is a member of a specific group can access NFS shares when logged in to a specific IdM client.
In the example, the following scenario is tested:
- An IdM user named idm_user belonging to the developers group can read and write the contents of the files in the /devel/project directory automounted on idm-client.idm.example.com, an IdM client located in the raleigh automount location.
Prerequisites
- You have set up an NFS server with Kerberos on an IdM host.
- You have configured automount locations, maps, and mount points in IdM in which you configured how IdM users can access the NFS share.
- You have used Ansible to add IdM users to the developers group that owns the NFS shares.
- You have configured automount on the IdM client.
Procedure
Verify that the IdM user can access the
read-writedirectory:Connect to the IdM client as the IdM user:
$ ssh idm_user@idm-client.idm.example.com Password:Obtain the ticket-granting ticket (TGT) for the IdM user:
$ kinit idm_userOptional: View the group membership of the IdM user:
$ ipa user-show idm_user User login: idm_user [...] Member of groups: developers, ipausersNavigate to the /devel/project directory:
$ cd /devel/projectList the directory contents:
$ ls rw_fileAdd a line to the file in the directory to test the
writepermission:$ echo "idm_user can write into the file" > rw_fileOptional: View the updated contents of the file:
$ cat rw_file this is a read-write file idm_user can write into the file
The output confirms that idm_user can write into the file.