mount.cifs //192.168.1.10/документы/it/ /home/LoginUser/it/ -o file_mode=0777,dir_mode=0777,username=LoginUser
я autofs использую, с такими параметрами
1S -fstype=cifs,file_mode=0777,dir_mode=0777,cred=/etc/mntuser/user,vers=2.1 ://192.168.1.3/документы
в справочнике можно покопаться
man mount.cifs
credentials=filename|cred=filename
specifies a file that contains a username and/or password and optionally the name of the workgroup. The format of the file is:
username=value
password=value
domain=value
...
cruid=arg
sets the uid of the owner of the credentials cache. This is primarily useful with sec=krb5. The default is the real uid of the process performing the mount. Setting this parameter
directs the upcall to look for a credentials cache owned by that user.
...
sec=arg
Security mode. Allowed values are:
· none - attempt to connection as a null user (no name)
· krb5 - Use Kerberos version 5 authentication
· krb5i - Use Kerberos authentication and forcibly enable packet signing
· ntlm - Use NTLM password hashing
· ntlmi - Use NTLM password hashing and force packet signing
· ntlmv2 - Use NTLMv2 password hashing
· ntlmv2i - Use NTLMv2 password hashing and force packet signing
· ntlmssp - Use NTLMv2 password hashing encapsulated in Raw NTLMSSP message
· ntlmsspi - Use NTLMv2 password hashing encapsulated in Raw NTLMSSP message, and force packet signing
The default in mainline kernel versions prior to v3.8 was sec=ntlm. In v3.8, the default was changed to sec=ntlmssp.
If the server requires signing during protocol negotiation, then it may be enabled automatically. Packet signing may also be enabled automatically if it's enabled in
/proc/fs/cifs/SecurityFlags.