Home > Storage > PowerScale (Isilon) > Product Documentation > Management and Migration > PowerScale OneFS Authentication, Identity Management, and Authorization > ID mapping database
Once a user has connected to the cluster and the token is generated, the SID and the corresponding UID with GID must be placed in the ID mapping database. Although it is easy to confuse user mapping with ID mapping, user mapping is the process of identifying users across authentication providers to generate a token. After the token is generated, the mappings of SID to UID are placed in the ID mapping database. The ID mapping database also contains a reciprocal entry for each user. Because PowerScale is zone aware, both the UID and SID are required for each user, regardless of whether the values are real or fake, as shown in the following figure:
Figure 11. ID mapping database
In the figure, the column on the right delineates which of the values are real or fake. 32 indicates the left is real; right is fake. 48 indicates the right is real, left is fake. 128 and 144 (not shown in the figure) indicate both the left and right values are real.
The command isi auth mapping list produces a list of the ID mapping database. The isi auth mapping command allows for manually deleting or adding entries. To see a list of the possible commands, enter isi auth mapping --help.