Dell DX6004S DX Object Storage Application Guide - Page 49

Security Realm Overview

Page 49 highlights

• Cluster administrators: The chapter on managing tenants in the DX Object Storage Administration Guide. • Application developers: Chapter 13, Managing Security for Application Developers • Domain managers: Chapter 14, Managing Security for Domain Managers 12.2. Security Realm Overview By default, domains, buckets, and objects are not secured so any user can perform any SCSP operation on them. This section discusses concepts related to how to restrict the SCSP operations that can be performed on buckets and objects. 12.2.1. Common Security Terminology This section discusses terminology commonly used with security. • Security realm: (Also referred to as a realm or a user list.) A list of user names and hashed passwords. You associate the user list with a bucket or object to give other users privileges to execute specific SCSP operations on the buckets or objects. • Authorization specification: List of SCSP operations users in a realm are allowed to execute. The authorization specification is specified by the Castor-Authorization header, as discussed in more detail in Section 12.3, "About Authorization Header Syntax". 12.2.2. About Security Realms A security realm (also referred to as a realm or user list) is an encoded list of user names, passwords, and optionally the name of the realm, using the HTTP Digest authentication algorithm. To encode the realm, you can use a programming language or a utility like Apache htdigest or md5sum as discussed in Section 12.6, "Creating Realms". Note • Realm names cannot contain a colon character (:) or a comma character (,). • The same users can belong to multiple realms. For more information about realms, see: • Section 12.3.1, "About Realm Names" • Section 12.6, "Creating Realms" 12.2.3. About Realm Caching and Security Your cluster administrator determines settings for realm cache, which determines the length of time changes to buckets or domains are propagated to all nodes in the cluster. The default setting is five minutes so at the default setting, it might take five minutes after an authorization change is made before the node you are accessing is aware of the change. DX Storage returns 401 (Unauthorized) or 404 (Not Found) responses if your client application attempts to access a bucket or domain before the realm update has been propagated to the node on which your client is attempting access. For example, if you authenticate as a user who is not in Copyright © 2010 Caringo, Inc. All rights reserved 44 Version 5.0 December 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Copyright © 2010 Caringo, Inc.
All rights reserved
44
Version 5.0
December 2010
Cluster administrators: The chapter on managing tenants in the DX Object Storage Administration
Guide.
Application developers:
Chapter 13,
Managing Security for Application Developers
Domain managers:
Chapter 14,
Managing Security for Domain Managers
12.2. Security Realm Overview
By default, domains, buckets, and objects are not secured so any user can perform any SCSP
operation on them. This section discusses concepts related to how to restrict the SCSP operations
that can be performed on buckets and objects.
12.2.1. Common Security Terminology
This section discusses terminology commonly used with security.
Security realm
: (Also referred to as a
realm
or a
user list
.) A list of user names and hashed
passwords. You associate the user list with a bucket or object to give other users privileges to
execute specific SCSP operations on the buckets or objects.
Authorization specification
: List of SCSP operations users in a realm are allowed to execute.
The authorization specification is specified by the
Castor-Authorization
header, as
discussed in more detail in
Section 12.3, “About Authorization Header Syntax”
.
12.2.2. About Security Realms
A security realm (also referred to as a
realm
or
user list
) is an encoded list of user names,
passwords, and optionally the name of the realm, using the
HTTP Digest
authentication algorithm.
To encode the realm, you can use a programming language or a utility like Apache
htdigest
or
md5sum
as discussed in
Section 12.6, “Creating Realms”
.
Note
Realm names cannot contain a colon character (
:
) or a comma character (
,
).
The same users can belong to multiple realms.
For more information about realms, see:
Section 12.3.1, “About Realm Names”
Section 12.6, “Creating Realms”
12.2.3. About Realm Caching and Security
Your cluster administrator determines settings for realm cache, which determines the length of time
changes to buckets or domains are propagated to all nodes in the cluster. The default setting is five
minutes so at the default setting, it might take five minutes after an authorization change is made
before the node you are accessing is aware of the change.
DX Storage returns 401 (Unauthorized) or 404 (Not Found) responses if your client application
attempts to access a bucket or domain before the realm update has been propagated to the node
on which your client is attempting access. For example, if you authenticate as a user who is not in