Nodeum Docs
HomepageBlog
  • ✨What is Nodeum?
    • Data Management Software
  • 👣GETTING STARTED
    • Step by Step
  • 🏨ARCHITECTURE
    • Standalone
    • High Availability
    • Fully Scalable & Resilience
  • Install and Deploy Nodeum
    • Platform Support
    • Nodeum v1
      • Ansible based installation
    • Nodeum v2 - Data Mover
      • Ansible based Installation
        • Customize your Installation
      • Docker Based Deployment
    • SLURM Integration
    • Software License Application
  • Interfaces
    • ND Client
    • Console
      • Manual for Administrator
        • Login
        • Dashboard & Reports
        • Catalog
        • Data Mover Management
        • Advanced Task Management
        • Data Container
        • Primary Storage Configuration
        • Pool Management
        • TCO Calculator
        • Toolbox
        • System Settings
          • Information
          • Configuration
          • Date & Time
          • Backup
          • Services
          • Hostname and DNS Configuration
          • NAS Storage Configuration
          • Object Storage Configuration
          • Tape Library Configuration
          • User Management
          • Audits
      • Manual for End User
    • For Developers
      • RESTful API
      • Configuration through RestAPI Console
      • Software Developement Kits (SDK)
      • Nodeum API
        • API Terms of Use
        • release v1.x
        • release v2.x
  • DATA MOVER
    • Policy-Based Task orchestration
      • Pool Management
      • Scheduler
      • Data Integrity
      • Priority Management
      • Filtering (Basic or Advanced)
      • Hook service (callback)
    • Content traceability
    • Metadata Management
  • IDENTITY MANAGEMENT
    • Right - Authentication & Authorization
    • LDAP Plugin for JWT Token
  • Container Configuration
    • Prerequisites
    • About Container
    • Authorization and Authentication
    • Access your Container
  • HYBRID STORAGE MANAGEMENT
    • File System Managment
    • Object Storage Management
      • Customize your S3 connection
    • Tape Library Management
      • Tape Writing Format : LTFS
      • Tape Compression
      • Tape Rehydratation
      • Import a LTFS Tape
      • Task Maintenance for Tapes
  • ⏰Alert & Monitoring
    • Alerts
    • Monitoring
    • Log Management
  • 🏥Recover after Hardware Failure
    • Failover - Active/Passive
    • Failover Procedure - One Site
    • Backup & Restore
  • 🔐Security Guide
    • Advanced Network Configuration
    • Add a SSL Certificate on Web Console
    • Enable SSL Certificate Container accessible on S3 Protocol
  • Compatibility guide
    • Software requirement
    • Supported Storage
  • PRODUCT SPECIFICATIONS
    • Character Set Support
    • Limitations
    • Files Status
    • Task Status
Powered by GitBook
On this page
  • Configure the Authentication Services
  • Create local User & Group
  • Generate S3 policy for a local User
  • Define the rights and privileges
  • Preserve UID/GID between NFS Client and a Container

Was this helpful?

  1. Container Configuration

Authorization and Authentication

Last updated 2 months ago

Was this helpful?

System -> User Management -> Container

Privileged access to containers is managed on a per-container basis. This page displays the list of available users and groups. This is also where the authentication mode can be defined.

The right and privileged of data stored in the container follows these rules:

  • Once a Workflow copy data into a Container ; the right and privilege of the original data are kept. This requires having Container user permission well configured to authorize these users to access their files.

  • If end users copy files through container in using SMB protocols, the rights will be the one defined in the Container access. Rights granted by the Container and associated permission schema.

Three types of authorization and authentication are available to access Container:

  1. Local users and groups

  2. Active Directory

  3. LDAP

Configure the Authentication Services

Local users only

The default configuration is to use local user and group settings. The other two options are available to connect to either Active Directory or LDAP service.

Active Directory

The configuration allows the definition of an Active Directory connection. Validate all settings before saving them using the "Test connection" button. The "Save" button will confirm the connection to the selected Active Directory server and will join the Nodeum server to the Active Directory domain.

LDAP

This last configuration allows you to define a connection to an LDAP service. Validate all the settings before saving them by pressing the "Test Connection" button. The "Save" button confirms the connection to the selected LDAP server.

Create local User & Group

Click on the button '+' to add a new user:

Then this modal appears, and complete the information and save it:

  • User Name: Name of the User you would like to create,

  • Password: Password for this User,

  • Confirm Password: Retype the password to confirm it,

  • Optional: Select the group you want this user associated with.

For creating a new group, you have to go to the according tab "group"

Then this modal appears, and complete the information and save it:

  • Group Name: Name of the Group you would like to create.

  • Select the user(s) you want to include in this group.

Generate S3 policy for a local User

It is possible to generate an S3 policy for any defined local user to enable S3 access to a container.

The procedure is to create the user as defined in the previous section. Once done, you need to edit it and follow these steps:

In this panel, you will see the URL and credentials required to access the S3 object storage console available. Copy in your clipboard the available S3 policy generated.

Then access the Minio Console url in using the Root User and Root Password available. Create through the Access menu a new policy and paste the policy from the clipboard.

Then, create a user, define your own password, and attach the defined policy to this user.

Once done, you are ready to access the Container through S3 with the user you have created. By default, the access to the Container in S3 are done through the port 9000.

Define the rights and privileges

With any of those, it is possible to define the rights and privileges of each user. This will allow and authorize the access of the container.

To set this authorization:

  • Go to Container and choose it.

  • Select “User” and select in the 3 buttons the edit button. you define the rights (Read/Write, Read Only, or no access).

Preserve UID/GID between NFS Client and a Container

Objective: Ensure that UID and GID preservation is maintained between an NFS client and a Container accessed via the NFS protocol

To achieve this, configure idmap on both the client and the Nodeum server.

Nodeum

Edit the idmap.conf file

...
Domain = localdomain
...
[Mapping]
 
Nobody-User = admin
Nobody-Group = customergroup
...

Activate 'idmapping':

echo N > /sys/module/nfsd/parameters/nfs4_disable_idmapping

Configure the export:

/mnt/FUSE *(rw,all_squash,anonuid=1000,anongid=2000,subtree_check,fsid=0)

Where uid=1000 is already existing

Where gid=2000 is a new group which has to be created

And restart the service

# systemctl restart nfs-idmapd.service

Client

  • uid=1000 is customeruser user

  • gid=2000 is customergroup group

Edit the idmap.conf file

[General]
 
Verbosity = 0
Pipefs-Directory = /var/lib/nfs/rpc_pipefs
Domain = localdomain
 
[Mapping]
 
# Nobody-User = nobody
Nobody-User = customeruser
# Nobody-Group = nobody
Nobody-Group = customergroup

Activate 'idmapping':

echo N > /sys/module/nfsd/parameters/nfs4_disable_idm

And restart the service

# systemctl restart nfs-idmapd.service

List Container's user
List of Authentication Services
User Creation
User Creation Page
Group Creation
Group Creation Page
User detail
Container User Management
Edit Container
Define the Container's Priviledges