Active Directory & Kerberos
Integrate MayaNAS with directory services for centralized authentication. Required for Kerberos-secured NFS exports and domain-joined SMB sharing.
Access
Section titled “Access”Navigate to Configure Server > Directory Services in the Web UI sidebar.
Supported Directory Services
Section titled “Supported Directory Services”| Service | Use Case |
|---|---|
| Azure Active Directory | Azure-hosted AD for cloud deployments |
| FreeIPA | Open-source identity management (Linux-native) |
| LDAP | Lightweight Directory Access Protocol |
| NIS | Network Information Service (legacy Unix) |
| Kerberos (Standalone) | Kerberos KDC without full AD integration |
Active Directory
Section titled “Active Directory”Prerequisites
Section titled “Prerequisites”- AD domain controller reachable from MayaNAS
- DNS configured to resolve the AD domain
- An AD account with domain join privileges
Join a Domain
Section titled “Join a Domain”- Navigate to Configure Server > Directory Services > Active Directory
- Click Join
- Fill in:
| Field | Description |
|---|---|
| Domain | AD domain name (e.g., corp.example.com) |
| Username | Admin username with join privileges |
| Password | Admin password |
| Enable Winbind | Enable Winbind service for name resolution |
- Optionally expand Additional Options:
| Field | Description |
|---|---|
| Computer OU | Organizational Unit for the computer account |
| User Principal | User principal name |
| Automatic ID Mapping | Map Windows SIDs to Unix UIDs/GIDs automatically |
- Click Join
Discover a Domain
Section titled “Discover a Domain”Before joining, you can click Discover to verify DNS resolution and locate domain controllers:
- Enter the domain name
- Click Discover
- Review the discovered domain controllers and services
Leave a Domain
Section titled “Leave a Domain”- Click Leave
- Confirm the action
After Joining
Section titled “After Joining”Once joined, the configuration panel shows:
- Domain Name
- Directory Type
- Client Software
- Login Formats
- Login Policy
- NFS SPN (Service Principal Name for Kerberos NFS)
FreeIPA
Section titled “FreeIPA”Join a FreeIPA Domain
Section titled “Join a FreeIPA Domain”- Navigate to Configure Server > Directory Services > FreeIPA
- Click Join
- Fill in:
| Field | Description |
|---|---|
| Domain | FreeIPA domain |
| Username | Admin username |
| Password | Admin password |
- Optionally configure Computer OU, User Principal, and Automatic ID Mapping
- Click Join
Leave FreeIPA
Section titled “Leave FreeIPA”Click Leave to disjoin from the FreeIPA domain.
Enable NIS
Section titled “Enable NIS”- Navigate to Configure Server > Directory Services > NIS
- Click Enable
- The panel shows the NIS Domain and NIS Server (from
ypwhich)
Disable NIS
Section titled “Disable NIS”Click Disable to stop NIS name resolution.
Standalone Kerberos
Section titled “Standalone Kerberos”For environments with a Kerberos KDC but no full AD or FreeIPA deployment.
Configure Kerberos
Section titled “Configure Kerberos”- Navigate to Configure Server > Directory Services > Kerberos
- Fill in:
| Field | Description | Default |
|---|---|---|
| Realm | Kerberos realm (e.g., CORP.EXAMPLE.COM) | — |
| KDC Server | Hostname or IP of the KDC | — |
| KDC Port | KDC port | 88 |
- Click Save
Test Connectivity
Section titled “Test Connectivity”Click Test to verify connectivity to the KDC.
Upload Keytab
Section titled “Upload Keytab”A keytab file is required for NFS Kerberos. The keytab must contain an nfs/<hostname>@REALM principal.
- Generate the keytab on the KDC:
Terminal window kadmin -q "ktadd -k nfs.keytab nfs/mayanas.corp.com@CORP.EXAMPLE.COM" - Click Upload Keytab
- Select the
.keytabfile - The panel shows the imported principals
Impact on NFS and SMB
Section titled “Impact on NFS and SMB”NFS with Kerberos
Section titled “NFS with Kerberos”After configuring directory services, NFS shares can use Kerberos security:
sec=krb5— Authentication onlysec=krb5i— Authentication + integritysec=krb5p— Authentication + integrity + encryption
The NFS Shares panel shows a lock icon on Kerberos-secured exports. See NFS Shares for export configuration.
SMB with Active Directory
Section titled “SMB with Active Directory”After AD join, SMB shares authenticate domain users automatically:
- Domain users can access shares with their AD credentials
- Windows ACLs can be applied via the Security panel
- Domain-joined clients get transparent Kerberos SSO
See SMB Shares for share configuration.