ResultUpdated kerberos configuration.authenticate --add [--user ]DescriptionAdds a new local CIFS workgroup user for CIFS authentication (and administrative tasks) after you provide and confirmthe CIFS user password.Syntaxauthenticate --add --user administrator2ResultEnter password for new CIFS user administrator2:Re-enter password for new CIFS user administrator2:Added CIFS user administrator2.authenticate --add [--login_group ]DescriptionAdds an authenticated login group in an Active Directory Services (ADS) domain in accordance with the following ADSlogin group guidelines:• Log in as an administrator via the CLI, and use SSH, Telnet, or a local console connection as a domain\user thatis part of a login group. When you log in as an administrator via the CLI, you are prompted to use the credentialsof the user account by which you log in (for example: if you log in as a Domain\administrator, you need torespond using these credentials).• Log in as an administrator via the GUI, and use a web interface connection as a domain\user that is part of alogin group (when this has been enabled via the CLI).• If no login group is specified, or the group is disabled, no access using domain accounts is permitted.• Adding a login group can only be enabled via the CLI.• Adding a login group is only possible when the DR Series system is already joined to a domain.• If the login group name has a space in it, it must be contained within double-quotation marks (“ “).• When adding a login group, it must use the naming convention of Domain\group name.• The login group must exist in the domain before you can add it (a check is performed to verify that the groupexists in ADS).• Changes made to the login group take effect on the next log in attempt (no active checking is done on group,which matches how Windows ADS works).NOTE: To delete an existing login group, see authenticate --delete [--login_group ].Syntaxauthenticate --add --login_group "acmeads\Domain Admins"ResultSuccessfully added login group acmeads\Domain Admins.30