Planning the security strategy

This topic describes how to plan the security strategy

You can control access to data by implementing LUN masking, switch zoning, and file-permission semantics that are native tot the client platforms.

You can also control administrative access to the SAN File System through an LDAP server. Administrative users log in to the SAN File System (through either the SAN File System console or the Administrative command-line interface) and are authenticated through the LDAP server. SAN File System uses roles to determine the level of access that each administrator has.

Perform these tasks to plan the security strategy:

Parent topic: Planning

Terms of use | Feedback
(C) Copyright IBM Corporation 2003, 2004. All Rights Reserved.