Overview
The objective is to create a NAS role and user with required permissions using CLI.
Procedure title
NOTE: User name ‘nas-phoenix’ and role name ‘namespace’ are user-defined and can be set as needed.
Below are the steps to create a new role and user for NAS backups with Phoenix:
- Establish an SSH connection to any node in the Isilon cluster. 
- OPTIONAL – If a local user is needed then the following syntax can be used. Please be advised that a local user generally will not have access to the shares and a separate credential will need to be used to access the data. - isi auth users create nas-phoenix --enabled True --set-password 
- Create the “namespace” role in the system access zone with the required privileges by typing: 
  (NOTE: namespace role name is user-defined and can be set as needed.)- isi auth roles create namespace isi auth roles modify namespace --add-priv ISI_PRIV_LOGIN_PAPI isi auth roles modify namespace --add-priv ISI_PRIV_ROLE isi auth roles modify namespace --add-priv ISI_PRIV_NS_TRAVERSE isi auth roles modify namespace --add-priv ISI_PRIV_NS_IFS_ACCESS isi auth roles modify namespace --add-priv ISI_PRIV_NFS isi auth roles modify namespace --add-priv ISI_PRIV_SMB isi auth roles modify namespace --add-priv ISI_PRIV_SNAPSHOT isi auth roles modify namespace --add-priv ISI_PRIV_JOB_ENGINE
- Add the user to the newly created role: 
  (NOTE: username ‘nas-phoenix’ name is user-defined and can be set as needed, and can use a domain account like Domain\user_name or user_name@domain.com )- Local - isi auth roles modify namespace --add-user nas-phoenix 
- Domain - isi auth roles modify namespace --add-user Domain\user_name 
 
- Check the available zones on the device by running the following command. : - isi zone zones list 
- If additional zones are present besides ‘System” then repeat the steps below for each access zone that is to be protected. It is normal practice that additional zones are present. 
  (NOTE: The ‘namespace’ role name, user name ‘nas-phoenix’ should match what was used above. The ‘zone_name’ should be replaced for each zone needing to be protected)- isi auth roles create namespace –zone zone_name 
 isi auth roles modify namespace --add-priv ISI_PRIV_LOGIN_PAPI –zone zone_name
 isi auth roles modify namespace --add-priv ISI_PRIV_ROLE –zone zone_name
 isi auth roles modify namespace --add-priv ISI_PRIV_NS_TRAVERSE –zone zone_name
 isi auth roles modify namespace --add-priv ISI_PRIV_NS_IFS_ACCESS –zone zone_name
 isi auth roles modify namespace --add-priv ISI_PRIV_NFS –zone zone_name
 isi auth roles modify namespace --add-priv ISI_PRIV_SMB –zone zone_name
 isi auth roles modify namespace --add-user nas-phoenix –zone zone_name
  (Where nas-phoenix is the user intended to protect the device data.)
