Keystone token flush, Managing non-administrative accounts, Assigning – HP StoreAll Storage User Manual

Page 144

Advertising
background image

"http://10.10.104.116:8888/v1/AUTH_7b9a902423a582c9eda266dcf3ad6974a2b98e4b21ea7c9e1e8d38f76afdf1b4"}],
"endpoints_links": [], "type": "object-store", "name": "swift"}], "user": {"username": "IBRQA1\\ibrixuser21",
"roles_links": [], "id": "7b9a902423a582c9eda266dcf3ad697444be1dddc4fb6ba53ab2034013a51392", "roles": [{"name":
"admin"}], "name": "IBRQA1\\ibrixuser21"}, "metadata": {"is_admin": true, "roles":
["7b9a902423a582c9eda266dcf3ad6974a2b98e4b21ea7c9e1e8d38f76afdf1b4"]}}}

In this example,

Token expiration date and time (the token is set to expire at 10:08 p.m., August 21, 2013
UTC/GMT time):2013-08-21T20:08:48Z

Authentication token ID: 1bb88b944f6c4c8fb7411f85d3bd6bf4.

Tenant ID:
7b9a902423a582c9eda266dcf3ad6974a2b98e4b21ea7c9e1e8d38f76afdf1b4

Tenant name: IBRQA1\\domain^users

The endpoint, which is listed as the publicURL in this example:

http://10.10.104.116:8888/v1/AUTH_7b9a902423a582c9eda266dcf3ad6974a2b98e4b21ea7c9e1e8d38f76afdf1b4

Keystone token flush

The keystone identity server generated tokens are stored in the keystone database for Object Store.
After these tokens are expired, they are not automatically removed by the keystone identity server.
As the number of token generations increase, the size of the database will continue to grow
unmanaged. To clear this database, you need to flush all the tokens. The StoreAll administrator
needs to run the following command explicitly to remove expired tokens from the database:

ibrix_objectstoreadmin -d –e

This command has to be run periodically to keep the database up to date, and to increase the
performance of token validation by the keystone identity server.

Managing non-administrative accounts

You can assign non-administrative users read or write permissions to a container by using your
authentication token and endpoint in the commands provided in

“Assigning non-administrative

privileges with read-write access to a container” (page 144)

and

“Assigning non-administrative

privileges with read access to a container” (page 145)

. Your non-administrative users will need to

create their own authentication tokens. For a list of accessible tasks for each type of user, see

Table 15 (page 138)

.

Assigning non-administrative privileges with read-write access to a container

You can grant non-administrative users within your own group read-write access to a container by
adding them to an access control list for the container. Users with non-administrative privileges but
with write access to a container can only do the following in the container:

IMPORTANT:

Keep in mind:

You must be in the same group as the non-administrative user you are granting read-write
permissions to the container.

The user must generate their own token.

Give users the “<ENDPOINT>/<CONTAINER_NAME>” so the users can access the container.

You must have read access in order to have write access.

To set read-write access to a container:

curl -X PUT -i -H "X-Auth-Token: <AUTHENTICATION TOKEN>" -H

"X-Container-Write:<group:user>" -H "X-Container-Read: <group:user>"

<ENDPOINT>/<CONTAINER_NAME>

Sample command:

144 Using Object Store

Advertising