23.07.2014 Views

Lustre 1.6 Operations Manual

Lustre 1.6 Operations Manual

Lustre 1.6 Operations Manual

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 26<br />

<strong>Lustre</strong> Security<br />

This chapter describes <strong>Lustre</strong> security and includes the following section:<br />

■<br />

Using ACLs<br />

26.1 Using ACLs<br />

An access control list (ACL), is a set of data that informs an operating system about<br />

permissions or access rights that each user or group has to specific system objects,<br />

such as directories or files. Each object has a unique security attribute that identifies<br />

users who have access to it. The ACL lists each object and user access privileges such<br />

as read, write or execute.<br />

26.1.1 How ACLs Work<br />

Implementing ACLs varies between operating systems. Systems that support the<br />

Portable Operating System Interface (POSIX) family of standards share a simple yet<br />

powerful filesystem permission model, which should be well-known to the<br />

Linux/Unix administrator. ACLs add finer-grained permissions to this model,<br />

allowing for more complicated permission schemes. For a detailed explanation of<br />

ACLs on Linux, refer to the SuSE Labs article, Posix Access Control Lists on Linux:<br />

http://www.suse.de/~agruen/acl/linux-acls/online/<br />

We have implemented ACLs according to this model. <strong>Lustre</strong> supports the standard<br />

Linux ACL tools, setfacl, getfacl, and the historical chacl, normally installed with the<br />

ACL package.<br />

26-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!