Search
- Filter results by:
- View attachments
- https://kb.netapp.com/on-prem/ontap/Ontap_OS/OS-KBs/Changing_permissions_on_the_root_of_a_share_removes_inherited_ACEs_on_that_pathWhen attempting to edit the permissions on the root of a share, the following error is displayed when the root is inheriting ACEs from its parent: Remotely setting permissions on a folder at the root ...When attempting to edit the permissions on the root of a share, the following error is displayed when the root is inheriting ACEs from its parent: Remotely setting permissions on a folder at the root of a share removes all inherited permissions from the root folder and all subfolders. If 'yes' is selected, all inherited ACEs on the root of the share and any ACEs inherited from the root of the share are removed
- https://kb.netapp.com/Legacy/ONTAP/7Mode/All_files_folders_Unix_permissions_get_changed_from_777_to_700_after_migration_of_a_NTFS_volume_from_7_ModeApplies to ONTAP 9 and above 7MTT Volume Security Style: NTFS Issue After 7MTT migration of a NTFS security style volume, all files/folders Unix permissions get changed from 777 to 700(rwx --- ---) an...Applies to ONTAP 9 and above 7MTT Volume Security Style: NTFS Issue After 7MTT migration of a NTFS security style volume, all files/folders Unix permissions get changed from 777 to 700(rwx --- ---) and NFS user gets permission denied.
- https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/Unable_able_to_access_root_filesystem__of_share_to_fix_permissionsApplies to ONTAP 9 Issue Client trying to access share to take ownership and apply permissions fails with error: permission denied
- https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/NTFS_permissions_on_a_CIFS_share_are_not_taking_effect_on_a_specific_userThe user who is able to access the CIFS share even though ACL's don't allow access UNIX UID: pcuser <> Windows User: TEST\user1 (Windows Domain User) User is also a member of Everyone, Authenticated U...The user who is able to access the CIFS share even though ACL's don't allow access UNIX UID: pcuser <> Windows User: TEST\user1 (Windows Domain User) User is also a member of Everyone, Authenticated Users, and Network Users Permissions on the share also show no access for this user vserver security trace output for the user in question "Access is allowed because the operation is trusted and no security is configured while opening existing file or directory.
- https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/NTFS_Traverse_folder_execute_file_not_allowing_to_traverse_the_shareApplies to ONTAP 9 CIFS Issue NTFS permissions on the share only allow Traverse folder/execute but no Read permissions for given user NTFS permissions on a sub-folder have Read and Modify for the user...Applies to ONTAP 9 CIFS Issue NTFS permissions on the share only allow Traverse folder/execute but no Read permissions for given user NTFS permissions on a sub-folder have Read and Modify for the user Expectation is that the user will be able to traverse the share and have access to their directory However, they get "ACCESS_DENIED"
- https://kb.netapp.com/on-prem/ontap/da/SAN/SAN-KBs/NTFS_file_system_inconsistency_on_LUNApplies to ONTAP (all versions) FC/iSCSI LUNs Microsoft Windows hosts Issue Windows host reports NTFS file system inconsistency on volume mounted from NetApp LUN.
- https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/secd_nfsAuth_noCifsCred_error_when_accessing_an_NTFS_secured_volume_via_NFS_in_ONTAPApplies to ONTAP 9 NTFS security style Issue When attempting to mount or otherwise access data on an NTFS-secured volume via NFS, the operation can hang or report access or permission denied EMS repor...Applies to ONTAP 9 NTFS security style Issue When attempting to mount or otherwise access data on an NTFS-secured volume via NFS, the operation can hang or report access or permission denied EMS reports secd.nfsAuth.noCifsCred for the user's mapping RESULT_ERROR_KERBEROS_CLIENT_REVOKED:7519 maybe in SecD logs as well
- https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/UNIX_user_cannot_access_NTFS_volume_due_to_name_mapping_failureUNIX user from NFS client cannot access data on NTFS security style volume [?] Tue Jul 14 15:03:34 CEST [node-01: secd: secd.nfsAuth.noNameMap:error]:vserver (SVM) Cannot map UNIX name to CIFS name.Er...UNIX user from NFS client cannot access data on NTFS security style volume [?] Tue Jul 14 15:03:34 CEST [node-01: secd: secd.nfsAuth.noNameMap:error]:vserver (SVM) Cannot map UNIX name to CIFS name.Error: Get user credentials procedure failed [ 0] Trying to map 'test' to Windows user 'test' using implicit mapping **[ 11] FAILURE: Name mapping for UNIX user 'test' failed. Name mapping configuration shows that explicit mapping is defined for the same user
- https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/Unix_root_user_is_unable_to_access_NTFS_volume_in_ONTAP_9Error: Get user credentials procedure failed [ 0 ms] Determined UNIX id 0 is UNIX user 'root' [ 0] Trying to map 'root' to Windows user 'root' using implicit mapping [ 1] Using a cached connec...Error: Get user credentials procedure failed [ 0 ms] Determined UNIX id 0 is UNIX user 'root' [ 0] Trying to map 'root' to Windows user 'root' using implicit mapping [ 1] Using a cached connection to fr000-prddc001.eu.els.local [ 2] Could not find Windows name 'root' **[ 2] FAILURE: Name mapping for UNIX user 'root' failed with transient errors.
- https://kb.netapp.com/data-mgmt/OTV/VSC_Kbs/Deleting_data_from_NTFS_does_not_free_up_spaceApplies to NTFS VMware ONTAP Issue Deleting data from NTFS located on NFS datastore does not reclaim expected space
- https://kb.netapp.com/Legacy/ONTAP/7Mode/When_a_directory_is_dragged_dropped_or_moved_why_are_the_access_rights_not_inheritedAccording to Microsoft's KB article: How permissions are handled when you copy and move files and folders, by default an object inherits permissions from its parent object, either at the time of creat...According to Microsoft's KB article: How permissions are handled when you copy and move files and folders, by default an object inherits permissions from its parent object, either at the time of creation or when it is copied or moved to its parent folder. Test the same operation from the same client against a Windows SMB server configured in the same manner. Get the full output of the ACL's on both the parent directory and on the file itself after the operation has completed