OceanStor 9000 permission control mode

4

OceanStor 9000 provides permission control functions to ensure service access security. Permission control consists of system access permission control and directory access permission control.
System access permission control enables OceanStor 9000 or the authentication server to authenticate a user who is accessing NAS services.
Directory access permission control enables the permission control on a user who is accessing directories. A system administrator has rights to set read-only or read/write permissions on each shared directory.

Other related questions:
Directory permissions of an OceanStor 9000 file system
Directory permissions of an OceanStor 9000 file system refer to permissions on directories in WushanFS. WushanFS works in Linux and employs the rwx model of UNIX to control directory permissions.

Client user permissions for CIFS shares of OceanStor 9000
Client user permissions for CIFS shares refer to specific user permissions for CIFS shares created in OceanStor 9000. A permission can be Read-write, Read-only, Forbidden, or Full-control. Full control means that a client user has all permissions (such as read, write, delete, and rename).

Client host permissions for NFS shares of OceanStor 9000
Client host permissions for NFS shares refer to specific host permissions on NFS shares created in OceanStor 9000. Such permissions are host-specific but not user-specific. A permission can be Read-write, Read-write (not supporting delete or rename), or Read-only. Read-write means that a user has all permissions (such as read, write, delete, and rename).

Client user permissions for FTP shares of OceanStor 9000
Client user permissions for FTP shares refer to specific user permissions on FTP shares created in OceanStor 9000. A permission can be View file list, Create folder, Upload file, Download file, or Delete and rename.

OceanStor 9000 authentication mode
OceanStor 9000 supports multiple authentication modes, such as anonymous access, local user authentication, AD domain authentication, client IP address authentication, client host name authentication, LDAP authentication, and NIS authentication. For details, see the figure on the right.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top