Home > Storage > PowerScale (Isilon) > Product Documentation > Management and Migration > Dell PowerScale: Integrating OneFS with Kerberos Environment for Protocols > Configurations for Kerberized SMB access
The following configurations illustrate key steps to use SMB Kerberos authentication from both the cluster side and the Windows client side.
# isi auth ads create --name=example.com --user=administrator -groupnet=groupnet0
# isi zone zones modify --name=zone01 --add-auth-providers=lsaactivedirectory-provider:EXAMPLE.COM
# isi auth ads spn check --provider-name=EXAMPLE.COM
Possible missing SPNs:
HOST/sc01
HOST/sc01.example.com
nfs/sc01.example.com
For SMB Kerberos, HOST/SmartConnect_zone_name SPNs are required. From the output above, create the following SPNs using the isi CLI command.
# isi auth ads spn create --provider-name=EXAMPLE.COM --user=administrator --spn=HOST/sc01.example.com
# isi auth ads spn create --provider-name=EXAMPLE.COM --user=administrator --spn=HOST/sc01
Alternately, you can fix all missing SPNs quickly, with the following command.
# isi auth ads spn fix --provider-name=EXAMPLE.COM --user=administrator
If you have access rights to log on to your Active Directory domain controller server, you can find the associated SPNs under the advanced feature view in the attribute editor tab, as shown in Figure 2.