Dell DX6004S DX Object Storage Application Guide - Page 48

Introduction to Object Security

Page 48 highlights

Chapter 12. Introduction to Object Security Starting with DX Storage version 5.0, you can optionally provide security for domains, buckets, named objects, and unnamed objects. Because the UUIDs of unnamed objects are difficult to remember or to guess, this chapter focuses on providing security for named objects. The same procedures can be used to provide security to unnamed objects; however, note the following: • Unnamed objects must be referenced by UUID. • Security commands for unnamed anchor stream objects must include the alias=yes query argument. • All unnamed objects belong to the default cluster domain. • POST authentication for creating unnamed objects is enforced in the default cluster domain only. For more information about the default cluster domain, contact your cluster administrator. For more information about managing security for named objects, see the following topics: • Section 12.1, "About Security Roles" • Section 12.2, "Security Realm Overview" • Section 12.3, "About Authorization Header Syntax" • Section 12.5, "About Authorization Header Evaluation" • Section 12.6, "Creating Realms" • Section 12.7, "Updating the Realm on a Bucket" • Section 12.8, "Administrative Override and Security" 12.1. About Security Roles DX Storage uses the following roles to determine who can perform different types of actions in the cluster: • Cluster administrator: Creates tenants (that is, domains) and domain managers; and is responsible for the overall maintenance, management, and monitoring of the cluster. Cluster administrators are maintained in the node or cluster configuration file, unlike any other realm (the term realm is defined in Section 12.2.1, "Common Security Terminology"). • Domain manager: Created by cluster administrator, domain managers maintain the list of authorized domain users, as well as the list of domain managers. Users who are not in any realm defined by the domain manager can perform only those actions that require no authentication. • Application developer (that is, you): You are responsible for creating content in the domain (that is, buckets and objects for which you have privileges). The information discussed in this chapter applies to domain managers and application developers. More role-specific information can be found in one of the following: Copyright © 2010 Caringo, Inc. All rights reserved 43 Version 5.0 December 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Copyright © 2010 Caringo, Inc.
All rights reserved
43
Version 5.0
December 2010
Chapter 12. Introduction to Object Security
Starting with DX Storage version 5.0, you can optionally provide security for domains, buckets,
named objects, and unnamed objects. Because the UUIDs of unnamed objects are difficult to
remember or to guess, this chapter focuses on providing security for named objects.
The same procedures can be used to provide security to unnamed objects; however, note the
following:
Unnamed objects must be referenced by UUID.
Security commands for unnamed anchor stream objects must include the
alias=yes
query
argument.
All unnamed objects belong to the default cluster domain.
POST authentication for creating unnamed objects is enforced in the default cluster domain only.
For more information about the default cluster domain, contact your cluster administrator.
For more information about managing security for named objects, see the following topics:
Section 12.1, “About Security Roles”
Section 12.2, “Security Realm Overview”
Section 12.3, “About Authorization Header Syntax”
Section 12.5, “About Authorization Header Evaluation”
Section 12.6, “Creating Realms”
Section 12.7, “Updating the Realm on a Bucket”
Section 12.8, “Administrative Override and Security”
12.1. About Security Roles
DX Storage uses the following roles to determine who can perform different types of actions in the
cluster:
Cluster administrator
: Creates tenants (that is, domains) and domain managers; and is
responsible for the overall maintenance, management, and monitoring of the cluster.
Cluster administrators are maintained in the node or cluster configuration file, unlike any other
realm (the term
realm
is defined in
Section 12.2.1, “Common Security Terminology”
).
Domain manager
: Created by cluster administrator, domain managers maintain the list of
authorized domain users, as well as the list of domain managers.
Users who are not in any realm defined by the domain manager can perform only those actions
that require no authentication.
Application developer
(that is, you): You are responsible for creating content in the domain (that
is, buckets and objects for which you have privileges).
The information discussed in this chapter applies to domain managers and application developers.
More role-specific information can be found in one of the following: