Dell DX6004S DX Object Storage Application Guide - Page 55

Managing Security for Application, Developers

Page 55 highlights

Chapter 13. Managing Security for Application Developers This chapter discusses specific security-related tasks that must be performed by application developers. Before you continue, make sure you review the information discussed in Chapter 12, Introduction to Object Security. For more information about managing security for named objects, see the following topics: • Section 13.1, "What Application Developers Need to Know" • Section 13.4, "Examples of Creating Buckets and Named Objects" 13.1. What Application Developers Need to Know Your role is the application developer; for more information about all security roles, see Section 12.1, "About Security Roles". As an application developer, you need to know the following information before you create buckets and objects: • The name of your domain and whether or not it is the default cluster domain. Get this information from your cluster administrator. If your domain is the default cluster domain, you do not need to specify the domain name as the Host in your SCSP requests. • Whether or not your user account can create buckets in the domain, and any other restrictions on your user account. You can find this information yourself or you can get it from your domain manager. Note To determine whether a particular SCSP operation succeeds, DX Storage examines the following in order: 1. The admin query argument which, if present, bypasses other authorization methods. For more information about the admin query argument, see Section 17.2, "Administrative Override". 2. The operations allowed by the Allow header. For more information about the Allow header, see Chapter 17, Using the Allow Metadata Header. 3. The operations allowed to the realm specified in the Castor-Authorization header. 13.2. About Bucket Authorization To enable security on a bucket, you must append the bucket name to both the authorization specification and to the cluster node IP address. Copyright © 2010 Caringo, Inc. All rights reserved 50 Version 5.0 December 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Copyright © 2010 Caringo, Inc.
All rights reserved
50
Version 5.0
December 2010
Chapter 13. Managing Security for Application
Developers
This chapter discusses specific security-related tasks that must be performed by application
developers. Before you continue, make sure you review the information discussed in
Chapter 12,
Introduction to Object Security
.
For more information about managing security for named objects, see the following topics:
Section 13.1, “What Application Developers Need to Know”
Section 13.4, “Examples of Creating Buckets and Named Objects”
13.1. What Application Developers Need to Know
Your role is the application developer; for more information about all security roles, see
Section 12.1, “About Security Roles”
.
As an application developer, you need to know the following information before you create buckets
and objects:
The name of your domain and whether or not it is the default cluster domain.
Get this information from your cluster administrator. If your domain is the default cluster domain,
you do not need to specify the domain name as the Host in your SCSP requests.
Whether or not your user account can create buckets in the domain, and any other restrictions on
your user account.
You can find this information yourself or you can get it from your domain manager.
Note
To determine whether a particular SCSP operation succeeds, DX Storage examines the
following in order:
1. The
admin
query argument which, if present, bypasses other authorization methods.
For more information about the
admin
query argument, see
Section 17.2,
“Administrative Override”
.
2. The operations allowed by the Allow header.
For more information about the Allow header, see
Chapter 17,
Using the Allow
Metadata Header
.
3. The operations allowed to the realm specified in the
Castor-Authorization
header.
13.2. About Bucket Authorization
To enable security on a bucket, you must append the bucket name to both the authorization
specification and to the cluster node IP address.