StorNext Security
There are two predominate security models in modern file systems:
- Unix permission bits
- Access Control Lists (ACLs)
StorNext supports both models and when they are used depends on the client platform and StorNext file system configuration settings. Most notably, the securityModel
configuration variable may be set to one of the following values:
ACL
: With the ACL security model, permissions are enforced on Windows systems based on ACLs. On all other platforms, the security check is based on a combination of ACLs and Unix permission bits.Unixpermbits
: With the Unixpermbits security model, permissions are enforced on all platforms (including Windows) based on Unix permission bits.Legacy
: With the Legacy security model, permissions are enforced on Linux and Unix systems based on Unix permission bits.- Mac systems use either ACLs or Unix permission bits or a combination of the two, depending on other StorNext file system configuration settings.
- Windows systems use ACLs when the Windows Security setting is enabled; otherwise, Windows systems do not perform security checking.
The behavior of the various models is summarized in Table 1.
¹ ACLs only supported for Samba when using the StorNext NAS stack and enabling ACLs for a share
The selection of security model is made on a per file system basis. After a file system has been created, in many cases it is possible to change the security model without reinitializing the file system. However, there are a few exceptions:
- It is not possible to transition from the ACL model to the Unixpermbits model.
- It is not possible to transition to the Unixpermbits model from the Legacy model if Windows Security is enabled.
Which model is appropriate will depend on security requirements. Unix permission bits are simpler but not as flexible as ACLs. Both the ACL and Unixpermbits security models allow a single type of file permissions (ACLs or Unix permission bits) to be enforced uniformly across all platforms in a heterogeneous environment providing a consistent experience. However, in some cases, due to identity mapping constraints, the legacy model must be used. In such environments, both Unix permission bits and ACLs must be separately maintained.