Cargando…

Configuring user access control in CTA

<!--HTML-->CTA uses access mechanism provided by EOS and adds tape-specific layer. If one of these elements is misconfigured, a user won't be able to read a file, or, on the contrary, unauthorized access can be granted. This talk explains how the combination of the ACL, Unix permissions...

Descripción completa

Detalles Bibliográficos
Autor principal: Yurchenko, Volodymyr
Lenguaje:eng
Publicado: 2022
Materias:
Acceso en línea:http://cds.cern.ch/record/2803481
Descripción
Sumario:<!--HTML-->CTA uses access mechanism provided by EOS and adds tape-specific layer. If one of these elements is misconfigured, a user won't be able to read a file, or, on the contrary, unauthorized access can be granted. This talk explains how the combination of the ACL, Unix permissions and mount rules works in CTA. We show which tools we use for the permissions management and what are capabilities and limitations of our system.