Administrative security

Administrative security protects against unauthorized access to SAN File System administrative operations.

Administrative operations are kept secure with the use of several different levels of authorization access. These access levels are provided through a combination of site preparation steps, use of industry-standard protocols, and configuration of the SAN File System administrative infrastructure.

The steps to prepare your site include the following:

The SAN File System administrative infrastructure is designed to use the Secure Sockets Layer (SSL) as part of its Web server software-platform base. You log in to the SAN File System console, which is the Web-based user interface, through an SSL-secured login, and your ID is authenticated using the LDAP server.

To use the administrative command-line interface, you must first log in to an engine and be authorized, using the standard UNIX® security mechanisms. You can set up security so that SSH-based logins to the cluster are required before the user can use the administrative command-line interface. Then, while using the administrative command-line interface, all access is authorized using the LDAP server.

Parent topic: Concepts

Related concepts
Administrative server
Metadata server
User roles

Related tasks
Timing out all user authorizations

Terms of use | Feedback
(C) Copyright IBM Corporation 2003, 2004. All Rights Reserved.