Isilon - Using The PowerScale OneFS Isi - Auth - Expert Command To Manage Authentication Issues - Dell US
Isilon - Using The PowerScale OneFS Isi - Auth - Expert Command To Manage Authentication Issues - Dell US
com
Administration. Carts
Article Content
Products Sign In
Solutions
Article Properties
Services Create an Account
Rate This Article
Support
Back Dell Financial Services
Support Home
Contact Support
Support Library
Premier Sign In
Support Services & Warranty
Drivers & Downloads
Partner Program Sign In
Manuals & Documentation
Diagnostics & Tools
Service Requests & Dispatch Status
Order Support
Contact Support
Community
Contact Us
US/EN
Back
Article Content
Symptoms
n/a
Cause
n/a
Resolution
Introduction
The isi_auth_expert command was introduced in OneFS 7.1.1.9, OneFS 7.2.1.3, OneFS 8.0.0.1,
and OneFS 8.0.1.0. The command can also be installed on clusters running OneFS 7.1.1.0 through
7.1.1.8 and OneFS 7.2.1.0 through 7.2.1.2 by installing patch-164666 which is available for download
from the Dell EMC Online Support site.
You can run the isi_auth_expert command to examine an PowerScale OneFS cluster's
authentication environment to help ensure that it is properly configured and to identify conditions that
could be causing data access latency due to the authentication configuration issues.
The isi_auth_expert command runs a series of tests, including network and port connectivity and
latency, binding, and clock skew. These results can be used to isolate a problematic configuration or
network path that is causing data access issues.
Contact Support
After configuration changes have affected network paths between a cluster and its
authenticiation providers.
NOTE: New checks and parameters were added to the isi_auth_expert command in OneFS
7.2.1.5. See the Additional checks and parameters in OneFS 7.2.1.5 and later section of this article for
more information.
Instructions
To run the isi_auth_expert command on clusters running OneFS 7.1.1.9, OneFS 7.2.1.3, OneFS 8.0.0.1,
OneFS 8.0.1.0 or later, run the following command:
isi_auth_expert
To run the isi_auth_expert command on a cluster to which the patch has been applied, run the
following command:
/usr/local/isi_auth_expert/isi_auth_expert
You can also run the command with one or more of the options listed in the table below:
Option Explanation
-h, --help Show the syntax for this command
-h, --debug Display debugging messages
-v, --verbose Enable verbose (more robust) output
--no-color Disable colored output
Example output
wcvirt1-1# isi_auth_expert
Implemented tests
When you run the isi_auth_expert command, the following checks are performed.
Process checks
This test confirms that the authentication-related processes (lsass, lwio & netlogon) are running. If
any of the processes are not running, an error is returned.
Active Directory
The following section describes the tests that the isi_auth_expert command performs for each
Contact Support
Active Directory (AD) provider.
Check DC ports
Verify that for every DC, the cluster can connect to the AD-related ports, and that the ports are
accepting connections.
LDAP
The following section describes the tests that the isi_auth_expert command performs for each
LDAP provider.
LDAP connectivity
Check LDAP server connectivity by making an anonymous LDAP bind and checking the results.
Confirm that each LDAP server supports enumerated objects by checking the LDAP servers'
supported controls. OneFS requires either the paged results controls or both the virtual list view
and server-side sorting controls.
Perform a test query against the configured base-dn to ensure configuration compatibility with
the LDAP server.
Perform a test query against the configured user-base-dn to ensure configuration compatibility
with the LDAP server.
Validate configured group-base-dn
Perform a test query against the configured group-base-dn to ensure configuration compatibility
with the LDAP server.
Contact Support
Active Directory
The isi_auth_expert command can calculate two types of latencies: ping latency and LDAP
latency for all of the domain controllers. If the clock skew is less than five minutes, the command will
return: "There is minimal or no skew between the AD provider and your machine."
Option Explanation
--ldap-user Checks the LDAP provider for a specified user
--sfu-user Checks the Active Directory Global Catalog for a specified user
--admin- Enables you to supply the credentials that are required when checking the Active
creds Directory Global Catalog
To run the Active Directory Global Catalog SFU check, you must run the isi_auth_expert command with
the --sfu-user=<user> and --admin-creds="[('<Domain>', '<User>',
'<password>')]" parameters where <user> is the SFU user you want to check and "
[('<Domain>', '<User>', '<password>')]" are the credentials the isi_auth_expert
command must provide to perform the Global Catalog lookup in the domain controller. Note that we
currently have the following limitation when checking the global catalog: You must provide
administrator credentials.
This feature is used to check for missing SPNs in both Kerberos providers and also in SmartConnect
zones. The command collects all of the SPNs associated with the providers and SmartConnect zones
and ensures that the required SPNs are present.
If you are using SmartConnect aliases, it also checks against those aliases. You can use the isi
auth ads spn or isi auth krb5 spn commands to list, check, or fix reported missing SPNs.
Article Properties
Contact Support
Affected Product
Isilon, PowerScale OneFS
Version
4
Article Type
Solution
Accurate
Useful
Easy to Understand
Submit Feedback
Back to Top
Contact Support
Order Status Contact Support Contact Us
YouTube
Our Offerings Our Offerings Our Company Our Company Our Partners Our Partners Resources Resources
Perspectives Glossary
Copyright © 2023 Dell Inc. Terms of Sale Privacy Statement Do Not Sell or Share My Personal Information Cookies, Ads & Emails