Permissions Mapping in the Isilon OneFS File System
|
|
|
- Erin Gilbert
- 9 years ago
- Views:
Transcription
1 Permissions Mapping in the Isilon OneFS File System NTFS ACLs, NFSv4 ACLs, and POSIX Mode Bits Steven Danneman and Zack Kirsch
2 Agenda What is OneFS? POSIX, NTFS and NFSv4 Permission Overview Isilon s Permission Implementation Setting Retrieval Enforcement Advanced Permission Implementation Special Identities Inheritance Canonical Order 2
3 Isilon OneFS Cluster NAS file server Scalable Add more storage in 5 mins Reliable 8x mirror / +4 parity Striped across nodes Single volume file system (5.2 PB) 3 to 144 nodes Fully symmetric peers No metadata servers Commodity hardware CPU, Mem, Disks (12 to 36) 3
4 Isilon OneFS File System Concurrent access to all files with all protocols CIFS/SMB NFSv3 SSH HTTP/FTP Coming Soon NFSv4 SMB2 4
5 Permission Basics 5
6 Unix Permissions Mode bits rwxrwxrwx Read / Write / Execute Owner / Group / Other POSIX ACLs Give rwx permission to other users & groups Closer to NTFS ACLs, but less expressive Replaced in OneFS by NTFS ACLs 6
7 NTFS Access Control List Approximately 15 rights vs 3 rwx rights. Security Descriptor (SD) Owner, Group Discretionary ACL (ACL) List of Access Control Entries (ACE) System ACL ACE User / Group Identifier (UID/GID in OneFS) Allow & Deny List of rights Inheritance 7
8 Comparison POSIX modes are a complete subset of NTFS rights Minus the top 3 bits SetUID, SetGID, Sticky Order of enforcement is different POSIX 1. Determine identity 2. Check 1 of 3 possible lists NTFS 1. Determine identity 2. Check 1 list 8
9 Permission Modification POSIX semantics: chmod: Only owner/root chown: Only root chgrp: Only owner/root, only to groups they are part of NTFS semantics: chmod: Needs WRITE_DAC; owner can always change permissions chown: Needs WRITE_OWNER; cannot give away a file chgrp: Needs WRITE_OWNER; can change to any group OneFS: Global Policy dictates behavior regardless of protocol 9
10 NFSv4 Access Control List Small Differences Uses principals instead of IDs, e.g. uid/gid allowed for backwards compatibility New Rights ACE4_WRITE_RETENTION / ACE4_WRITE_RETENTION_HOLD Mappable to ACE4_WRITE_ATTRIBUTES Mostly Identical to NTFS ACL 10
11 Isilon Implementation 11
12 Design Goals Store one authoritative set of permissions per file Preference NTFS ACL over mode bits Enforce identical permissions for all protocols Provide view of alternate permission type: NFS is returned approximated mode bits SMB is returned a SYNTHETIC ACL Provide configuration through global permission policy Extend standard Unix tools for all permission management ls, chmod, chown, chgrp 12
13 SMB File Creation Store ACL 1) SD sent with create : Store provided ACL 2) Inheritable ACL exists on parent : Store Inherited ACL 3) No Inheritable ACL exists : Store Default ACL Store approximated mode bits Give NFS clients a view of the permissions Stored mode bits are not used for enforcement Permissive enough to trick client access evaluation 13
14 NFS File Creation No inheritable ACL exists Store mode bits only Inheritable ACL exists on parent Apply inheritable ACL only Store approximated mode bits 14
15 Permissions Setting chmod w/ ACL (SMB or local) Store ACL Store approximated mode bits chmod w/ mode bits (NFS or local) No ACL exists Store mode bits ACL exists Merge mode bits with ACL Add/modify ACEs for three identities: owner, group, everyone Leave other identities unchanged Add deny ACEs for bits that are not present Inheritance hierarchy remains 15
16 Permissions Retrieval SMB If ACL, ACL is returned If mode bits, return SYNTHETIC ACL Not stored on disk, translated on demand NFS Always show stored mode bits 16
17 Basic Permission Enforcement Goal: Enforce the same access on all files, from all protocols. SMB access on file with ACL Scan through ACL, until desired rights are allowed or denied NFS access on file with mode bits Simple comparison against owner, group or other Algorithm: 1. Convert desired rights / access mask to file s permission type 2. Basic permission enforcement 17
18 Advanced Enforcement I SMB access on file with mode bits Convert desired rights to Unix permissions List Folder -> Unix READ Create Files or Create Folders or Delete Subfolders/Files -> Unix WRITE Traverse Folder -> Unix EXECUTE Change Permissions, Take Ownership and Delete do not map ACL Policy: rwx = Full Control 18
19 Advanced Enforcement II NFS/Local access on file with ACL Convert desired access mask to ACL rights Unix READ -> List Folder Unix WRITE -> Create Files AND Create Folders AND Delete Subfolders/Files Unix EXECUTE -> Traverse Folder NFS Server uses Windows rights E.g. Asks for Create Files access instead of WRITE access NFS Access Request needs approximation Unix WRITE -> Create Files OR Create Folders OR Delete Subfolders/Files 19
20 Advanced Implementation 20
21 SMB Special Identities Changed UID/GID to struct identity Type / ID Everyone Null Used only for owner or group Group owner Used only for owner attribute CREATOR OWNER / CREATOR GROUP Inherit_only ACE on directory 21
22 Inheritance Auto Inheritance vs. Dynamic inheritance Auto - provide client with info to propagate ACLs Dynamic - file system handles ACL propagation Necessary for local inheritance propagation Auto Inheritance Dynamic Inheritance
23 Canonical Order Canonical order: Explicit Deny Explicit Allow Inherited Deny Inherited Allow Enforced by Windows GUI Moves deny ACEs up to the top Windows API allows setting ACEs in any order Problem: Out of order ACLs are necessary to represent POSIX ACLs r-- : Allow read, deny write, deny execute 23
24 Canonical Order - Example 1 Mode 754 with deny ACEs Simplified output: # chmod 754 file.txt # ls -le file.txt -rwxr-xr-- 1 test-user test-group 0 Sep 1 02:04 file.txt SYNTHETIC ACL 0: user:test-user allow full_control 1: group:test-group allow read, execute 2: group:test-group deny write 3: everyone allow read 4: everyone deny write, execute 24
25 Canonical Order - Example 2 After adding execute rights for Everyone via Windows GUI: Mode changed from 754 to 555, instead of 755 # ls -le file.txt -r-xr-xr-x 1 test-user test-group 0 Sep 1 02:04 file.txt 0: group:test-group deny write 1: everyone deny write 2: user:test-user allow full_control 3: group:test-group allow read, execute 4: everyone allow read, execute 25
26 Canonical Order - Example 3 Mode 754 without deny ACEs Simplified output: # chmod 754 file.txt # ls -le file.txt -rwxr-xr-- 1 test-user test-group 0 Sep 1 02:04 file.txt SYNTHETIC ACL 0: user:test-user allow full_control 1: group:test-group allow generic_read, generic_execute 2: everyone allow generic_read Configurable ACL policies for dealing with deny ACEs 26
27 Configurable Permission Policies Disallow ACL creation Disallow chmod from NFS Chown: Modify the owner/group permissions? Owning group on file creation BSD -> parent folder s owning group Windows/Linux -> user s primary GID 27
28 Lessons Learned Mixed permissions are challenging, but possible Some decisions must be left up to policy Best practice is to choose a default and document Call to Arms: ACL Interop Spec 28
29 Questions? Zack Kirsch Steven Danneman 29
Using NFS v4 ACLs with Samba in a multiprotocol environment
Using NFS v4 ACLs with Samba in a multiprotocol environment Alexander Werth IBM 2009 IBM Corporation Using NFS v4 ACLs with Samba in a multiprotocol environment Use multiple protocols with different authorization
EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL
White Paper EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL Abstract This paper explains how the unified security model of EMC Isilon OneFS 6.5.5 resolves mismatches between the permissions
ONEFS MULTIPROTOCOL SECURITY UNTANGLED
White Paper ONEFS MULTIPROTOCOL SECURITY UNTANGLED Abstract This paper describes the role that identity management, authentication, and access control play in the security system of the EMC Isilon OneFS
This section discusses the protocols available for volumes on Nasuni Filers.
Nasuni Corporation Natick, MA Introduction The Nasuni Filer provides efficient and convenient global access to your data. Nasuni s patented file system, UniFS, combines the performance and consistency
WHITE PAPER. Understanding Windows & UNIX File Permissions on GuardianOS
WHITE PAPER Understanding Windows & UNIX File Permissions on GuardianOS Introduction Overland Storage Snap Server storage systems powered by the GuardianOS operating system support many file access protocols
IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE
White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access
Operating Systems. 07.02 File system mounting, sharing, and protection. File System Mounting
07.02 File system mounting, sharing, and protection emanuele lattanzi isti information science and technology institute 1/15 File System Mounting A file system must be mounted before it can be accessed
USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE
White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts
Filesystem Security. General Principles
Filesystem Security 1 General Principles Files and folders are managed by the operating system Applications, including shells, access files through an API Access control entry (ACE) Allow/deny a certain
Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/
Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security 0 to full speed No protection system in early versions
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
TELE 301 Lecture 7: Linux/Unix file
Overview Last Lecture Scripting This Lecture Linux/Unix file system Next Lecture System installation Sources Installation and Getting Started Guide Linux System Administrators Guide Chapter 6 in Principles
Deploying a File Server Lesson 2
Deploying a File Server Lesson 2 Skills Matrix Technology Skill Objective Domain Objective # Adding a New Disk Configure storage 1.5 File Server The most basic and the most universal type of application
CIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 3 1/18/07 CIS/TCOM 551 1 Announcements Email project groups to Jeff (vaughan2 AT seas.upenn.edu) by Jan. 25 Start your projects early!
CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor
CSE543 - Introduction to Computer and Network Security Module: Reference Monitor Professor Trent Jaeger 1 Living with Vulnerabilities So, software is potentially vulnerable In a variety of ways So, how
Introduction to Computer Security
Introduction to Computer Security Windows Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Microsoft Windows Family Tree Key security milestones: NT 3.51 (1993): network drivers and
Using Samba with a Commercial Clustered File System
Using Samba with a Commercial Clustered File System Agenda Isilon Clustered Storage Overview Developing OneFS Samba and OneFS Clustering Samba Future Requirements 2 Isilon OneFS Cluster Single file system
Access Control Lists in Linux & Windows
Access Control Lists in Linux & Windows Vasudevan Nagendra & Yaohui Chen Categorization: Access Control Mechanisms Discretionary Access Control (DAC): Owner of object specifies who can access object (files/directories)
SHARING FILE SYSTEM RESOURCES
1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions
A COMPARISON BETWEEN THE SAMBA3 AND LIKEWISE LWIOD FILE SERVERS
A COMPARISON BETWEEN THE SAMBA3 AND LIKEWISE LWIOD FILE SERVERS May 7, 2010 Outline Overview Architecture Feature Set Administrator Perspective Developer Perspective Overview 18 years development GPLv3
System Security Fundamentals
System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview
Outline: Operating Systems
Outline: Operating Systems What is an OS OS Functions Multitasking Virtual Memory File Systems Window systems PC Operating System Wars: Windows vs. Linux 1 Operating System provides a way to boot (start)
CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY
White Paper CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY DVTel Latitude NVMS performance using EMC Isilon storage arrays Correct sizing for storage in a DVTel Latitude physical security
Clustered Data ONTAP 8.2
Updated for 8.2.1 Clustered Data ONTAP 8.2 File Access Management Guide for NFS NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4
CIS 551 / TCOM 401 Computer and Network Security Spring 2005 Lecture 4 Access Control: The Big Picture Objects - resources being protected E.g. files, devices, etc. Subjects - active entities E.g. processes,
Chapter 6, The Operating System Machine Level
Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General
CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006
CSE331: Introduction to Networks and Security Lecture 34 Fall 2006 Announcements Problem with Crypto.java Look for a new Crypto.java file later today Project 4 is due Dec. 8th at midnight. Homework 3 is
StorHouse/CIFS Installation and Configuration Guide
StorHouse/CIFS Installation and Configuration Guide Publication Number 007-6328-001 Release 2.0 November 19, 2013 2013 Silicon Graphics International Corp. All Rights Reserved; provided portions may be
Allion Ingrasys Europe. NAStorage. Security policy under a UNIX/LINUX environment. Version 2.01
Allion Ingrasys Europe NAStorage Security policy under a UNIX/LINUX environment Version 2.01 Security policy under a UNIX/LINUX environment Start Enabling a Unix/Linux Network (NFS Protocol) Adding a UNIX
EMC ISILON X-SERIES. Specifications. EMC Isilon X200. EMC Isilon X210. EMC Isilon X410 ARCHITECTURE
EMC ISILON X-SERIES EMC Isilon X200 EMC Isilon X210 The EMC Isilon X-Series, powered by the OneFS operating system, uses a highly versatile yet simple scale-out storage architecture to speed access to
Integrating Lustre with User Security Administration. LAD 15 // Chris Gouge // 2015 Sep
Integrating Lustre with User Security Administration LAD 15 // Chris Gouge // 2015 Sep Topics User Security in Linux POSIX Permissions The Requirement for Upcall in Lustre Upcall Utilities Overview Upcall
EMC ISILON AND ELEMENTAL SERVER
Configuration Guide EMC ISILON AND ELEMENTAL SERVER Configuration Guide for EMC Isilon Scale-Out NAS and Elemental Server v1.9 EMC Solutions Group Abstract EMC Isilon and Elemental provide best-in-class,
GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER
GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER Introduction Powered by the GuardianOS operating system, the Overland Storage Snap Server family
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
Lesson 14: Configuring File and Folder Access. MOAC 70-687: Configuring Windows 8.1
Lesson 14: Configuring File and Folder Access MOAC 70-687: Configuring Windows 8.1 Overview Exam Objective 4.2: Configure file and folder access o Encrypt files and folders by using Encrypting File System
CIS433/533 - Computer and Network Security Operating System Security
CIS433/533 - Computer and Network Security Operating System Security Professor Kevin Butler Winter 2010 Computer and Information Science OS Security An secure OS should provide (at least) the following
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
Combining Shared Folder and NTFS Permissions
Combining Shared Folder and When you combine NTFS permissions and share permissions the most restrictive effective permission applies. For example, if you share a folder and assign the share permission
BMC CONTROL-M Agentless Tips & Tricks TECHNICAL WHITE PAPER
BMC CONTROL-M Agentless Tips & Tricks TECHNICAL WHITE PAPER Table of Contents BMC CONTROL-M An IT workload automation platform... 1 Using standard agent-based scheduling... 1 Agentless scheduling... 1
AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK
White Paper AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK Abstract EMC Isilon SmartLock protects critical data against accidental, malicious or premature deletion or alteration. Whether you need to
CIFS/NFS Gateway Product Release Notes. Version 1.2.0 May 2015 Revision A0
CIFS/NFS Gateway Product Release Notes Version 1.2.0 May 2015 Revision A0 Important Information Information in this document is subject to change without notice and does not represent a commitment on the
Implementing an advanced access control model on Linux
Implementing an advanced access control model on Linux Aneesh Kumar K.V IBM Linux Technology Center [email protected] Andreas Grünbacher SUSE Labs, Novell [email protected] Greg Banks [email protected]
NAStorage. Administrator Guide. Security Policy Of NAStorage Under UNIX/LINUX Environment
NAStorage Administrator Guide Security Policy Of NAStorage Under UNIX/LINUX Environment Version 1.00 10/01/2002 Prepared by: Leon Hsu TS Engineer Ingrasys Technology Inc. E-mail: [email protected] UNIX/LINUX
FILE ARCHIVAL USING SYMANTEC ENTERPRISE VAULT WITH EMC ISILON
Best Practices Guide FILE ARCHIVAL USING SYMANTEC ENTERPRISE VAULT WITH EMC ISILON Abstract This white paper outlines best practices for deploying EMC Isilon OneFS scale-out storage with Symantec Enterprise
The Panasas Parallel Storage Cluster. Acknowledgement: Some of the material presented is under copyright by Panasas Inc.
The Panasas Parallel Storage Cluster What Is It? What Is The Panasas ActiveScale Storage Cluster A complete hardware and software storage solution Implements An Asynchronous, Parallel, Object-based, POSIX
The Mac OS X Server Essentials v10.5 Exam Skills Assessment Guide
The Mac OS X Server Essentials v10.5 Exam Skills Assessment Guide To Register This exam is offered at Apple Authorized Training Centers and Prometric Testing Centers worldwide. For information on exam
Understanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network
Understanding and Using NetInfo Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network K Apple Computer, Inc. 2001 Apple Computer, Inc. All rights
Three Linux Security Basics
Jeff Drake 1 Three Linux Security Basics The desktop has been dominated by the Microsoft s Window s platform for many years. The server room, although not as much so, has been equally affected by Microsoft
How To Manage File Access On Data Ontap On A Pc Or Mac Or Mac (For A Mac) On A Network (For Mac) With A Network Or Ipad (For An Ipad) On An Ipa (For Pc Or
Clustered Data ONTAP 8.3 File Access Management Guide for NFS NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277
Creating Home Directories for Windows and Macintosh Computers
ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory
New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer
New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good
Migrating from NFSv3 to NFSv4. Migrating from NFSv3 to NFSv4. March 2011. 1 of 10 2011 STORAGE NETWORKING INDUSTRY ASSOCIATION
Migrating from NFSv3 to NFSv4 Migrating from NFSv3 to NFSv4 March 2011 1 of 10 Table of Contents Introduction... 3 NFSv3 to NFSv4 Considerations... 4 Pseudo Filesystem...4 TCP only; no UDP support...5
Using Mac OS X Clients with Isilon OneFS 7.x. Resources for Integration and Configuration
Using Mac OS X Clients with Isilon OneFS 7.x Resources for Integration and Configuration September 23, 2014 Copyright 2014 EMC Corporation. All Rights Reserved. EMC believes the information in this publication
CIFS and NFS Auditing Guide
Clustered Data ONTAP 8.3 CIFS and NFS Auditing Guide February 2016 215-10879_A0 [email protected] Updated for 8.3.2 Table of Contents 3 Contents Deciding whether to use this guide... 6 Auditing NAS
Backup and Restore of CONFIGURATION Object on Windows 2008
Backup and Restore of CONFIGURATION Object on Windows 2008 Technical Whitepaper Contents Introduction... 3 CONFIGURATION Backup... 3 Windows configuration objects... 3 Active Directory... 4 DFS... 4 DHCP
BUGS! Catch Them Before They Catch You
BUGS! Catch Them Before They Catch You A Survey of Network Storage Test Tools and Industry Best Practices Peter Murray SwiftTest [email protected] 1 Agenda Today s Testing Landscape Storage Testing
Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
File Services. File Services at a Glance
File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using
Case Study: Access control 1 / 39
Case Study: Access control 1 / 39 Joint software development Mail 2 / 39 Situations Roles Permissions Why Enforce Access Controls? Classic Unix Setup ACL Setup Reviewer/Tester Access Medium-Size Group
Case Studies. Joint software development Mail 1 / 38. Case Studies Joint Software Development. Mailers
Joint software development Mail 1 / 38 Situations Roles Permissions Why Enforce Access Controls? Unix Setup Windows ACL Setup Reviewer/Tester Access Medium-Size Group Basic Structure Version Control Systems
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
Sharing Files Chapter 4 NOT ABOUT FOR SALE THIS OR CHAPTER DISTRIBUTION In this chapter, we work with the mechanisms provided by operating systems like Unix and Windows to protect files and folders. We
1 Posix API vs Windows API
1 Posix API vs Windows API 1.1 File I/O Using the Posix API, to open a file, you use open(filename, flags, more optional flags). If the O CREAT flag is passed, the file will be created if it doesnt exist.
Module 11. Configuring and Managing Distributed File System. Contents:
Configuring and Managing Distributed File System 11-1 Module 11 Configuring and Managing Distributed File System Contents: Lesson 1: DFS Overview 11-3 Lesson 2: Configuring DFS Namespaces 11-15 Lesson
Chapter 7: Unix Security. Chapter 7: 1
Chapter 7: Unix Security Chapter 7: 1 Objectives Understand the security features provided by a typical operating system. Introduce the basic Unix security model. See how general security principles are
SerNet. Clustered Samba. Nürnberg April 29, 2009. Volker Lendecke SerNet Samba Team. Network Service in a Service Network
Clustered Samba Nürnberg April 29, 2009 Volker Lendecke SerNet Samba Team 04/2009, Volker Lendecke, SerNet Service Network GmbH, Seite 1 Volker Lendecke Co-founder SerNet - Service Network GmbH Free Software
Capability-Based Access Control
Lecture Notes (Syracuse University) Capability: 1 Capability-Based Access Control 1 An Analogy: Bank Analogy We would like to use an example to illustrate the need for capabilities. In the following bank
Windows Server 2008 R2 Essentials
Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution
DiskBoss - Data Management Solution DiskBoss provides a large number of advanced data management and analysis operations including disk space usage analysis, file search, file classification and policy-based
Lucid Key Server v2 Installation Documentation. www.lucidcentral.org
Lucid Key Server v2 Installation Documentation Contents System Requirements...2 Web Server...3 Database Server...3 Java...3 Tomcat...3 Installation files...3 Creating the Database...3 Step 1: Create the
Big Data Management and Security
Big Data Management and Security Audit Concerns and Business Risks Tami Frankenfield Sr. Director, Analytics and Enterprise Data Mercury Insurance What is Big Data? Velocity + Volume + Variety = Value
your Apple warranty; see http://www.drivesavers.com/. There are two main failure modes for a mirrored RAID 1 set:
48981c03.qxd 12/6/07 8:56 PM Page 142 142 File Systems RAID set creation takes only a few moments, and once it s complete, you should see new RAID set volume in the Disk Utility list and in the Finder.
WHITE PAPER. Home Directories on Snap Server GuardianOS
WHITE PAPER Home Directories on Snap Server GuardianOS Introduction Home directories have become commonplace in today s corporate computing environments. Home directories present a central location for
The Real Challenges of Configuration Management
The Real Challenges of Configuration Management McCabe & Associates Table of Contents The Real Challenges of CM 3 Introduction 3 Parallel Development 3 Maintaining Multiple Releases 3 Rapid Development
Implementation of Hadoop Distributed File System Protocol on OneFS Tanuj Khurana EMC Isilon Storage Division
Implementation of Hadoop Distributed File System Protocol on OneFS Tanuj Khurana EMC Isilon Storage Division Outline HDFS Overview OneFS Overview HDFS protocol on OneFS HDFS protocol server implementation
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5 Agenda Security Hardening vsphere 5.5 ESXi Architectural Review ESXi Software Packaging The ESXi Firewall ESXi Local User Security Host Logs
Designing a Cloud Storage System
Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes
Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide
Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright
LucidNAS Quick Start Guide
LucidNAS Quick Start Guide This section demonstrates the initial preparation that should be performed before you start using the LucidNAS system. Set Administrative Access By default, no password is required
Chapter 12 File Management. Roadmap
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Overview Roadmap File organisation and Access
Chapter 12 File Management
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access
EMC ISILON HOME DIRECTORY STORAGE SOLUTIONS FOR NFS AND SMB ENVIRONMENTS
White Paper EMC ISILON HOME DIRECTORY STORAGE SOLUTIONS FOR NFS AND SMB ENVIRONMENTS Best-Practices Recommendations for Capacity and Performance Abstract This white paper provides technical information
4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access
4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows
Mac OS X Server. File Services Administration For Version 10.4 or Later
Mac OS X Server File Services Administration For Version 10.4 or Later K Apple Computer, Inc. 2005 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server
Macintosh Printer Management using Centrify DirectControl Group Policies
WHITE PAPER CENTRIFY CORP. MARCH 2010 Macintosh Printer Management using Centrify DirectControl Group Policies ABSTRACT This white paper examines various approaches to managing printer configuration files
Introduction to HDFS. Prasanth Kothuri, CERN
Prasanth Kothuri, CERN 2 What s HDFS HDFS is a distributed file system that is fault tolerant, scalable and extremely easy to expand. HDFS is the primary distributed storage for Hadoop applications. HDFS
Active Directory Compatibility with ExtremeZ-IP
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices White Paper Group Logic White Paper October 2010 About This Document The purpose of this technical paper is to discuss how ExtremeZ-IP
Clustered Data ONTAP 8.3
Updated for 8.3.1 Clustered Data ONTAP 8.3 CIFS and NFS Multiprotocol Configuration Express Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Adam Retter. Security. in exist-db. Security in exist-db http://www.adamretter.org.uk [email protected]
Adam Retter Security in exist-db Flickr: CC-BY: security by protohiro In the Past exist-db 1.4 and before Unix like Security Model (attempted) root user => admin user wheel group => DBA group Used rwu
Isilon OneFS. Version 7.2.0. Web Administration Guide
Isilon OneFS Version 7.2.0 Web Administration Guide Copyright 2001-2015 EMC Corporation. All rights reserved. Published in USA. Published July, 2015 EMC believes the information in this publication is
Implementing the Hadoop Distributed File System Protocol on OneFS Jeff Hughes EMC Isilon
Implementing the Hadoop Distributed File System Protocol on OneFS Jeff Hughes EMC Isilon Outline Hadoop Overview OneFS Overview MapReduce + OneFS Details of isi_hdfs_d Wrap up & Questions 2 Hadoop Overview
EMC ISILON NL-SERIES. Specifications. EMC Isilon NL400. EMC Isilon NL410 ARCHITECTURE
EMC ISILON NL-SERIES The challenge of cost-effectively storing and managing data is an ever-growing concern. You have to weigh the cost of storing certain aging data sets against the need for quick access.
How To Configure the Oracle ZFS Storage Appliance for Quest Authentication for Oracle Solaris
How To Configure the Oracle ZFS Storage Appliance for Quest Authentication for Oracle Solaris January 2014; v1.3 By Andrew Ness This article describes how to configure Quest Authentication Services in
Introduction to Hadoop HDFS and Ecosystems. Slides credits: Cloudera Academic Partners Program & Prof. De Liu, MSBA 6330 Harvesting Big Data
Introduction to Hadoop HDFS and Ecosystems ANSHUL MITTAL Slides credits: Cloudera Academic Partners Program & Prof. De Liu, MSBA 6330 Harvesting Big Data Topics The goal of this presentation is to give
