Identity management is about defining who can access the system and how they are identified. It ensures that users are correctly recognized across different systems (e.g., Linux, Windows) and that their credentials and identities are consistently mapped.
Sources:
Mapping Rules:
Practical Example:
1001. The system maps this UID to his Windows SID so that John can access files, regardless of whether he logs in from a Linux or Windows machine.Mechanism:
1002 can be mapped to a Windows SID S-1-5-21-1002.Configuration File:
isi auth mapping configuration file is used to define and manage these mappings.Practical Command:
To view the current mapping rules:
isi auth mapping list
Definition:
Supported Methods:
Example:
For Linux systems, an SSH key-based login might look like this:
ssh -i ~/.ssh/id_rsa user@storage-cluster
Authorization determines what a user or group is allowed to do once authenticated. It ensures proper access control to files and directories.
What is POSIX?
Permission Structure:
Practical Commands:
Change ownership:
chown john:developers file.txt
This assigns the file file.txt to the user "John" and the group "developers".
Modify permissions:
chmod 755 file.txt
This sets the file to be readable and executable by everyone, but writable only by the owner.
Example:
drwxr-xr--:d: Indicates a directory.rwx: Owner (read, write, execute).r-x: Group (read, execute).r--: Others (read only).What is ACL?
Function:
Key Commands:
View an ACL:
getfacl file.txt
Set an ACL for a specific user:
setfacl -m u:john:rw file.txt
This gives "John" read and write permissions for file.txt.
Practical Example:
| Feature | POSIX | ACL |
|---|---|---|
| Complexity | Simple | Advanced |
| Permission Scope | Owner, Group, Others | Individual users/groups |
| Use Case | Basic environments | Complex access control |
To configure identity management and authorization effectively:
This ensures that users can access the right resources securely and efficiently while maintaining proper control over the system.
nobody with UID 99) – This allows unknown users to access the system with limited permissions.| Mapping Type | Description | Use Case |
|---|---|---|
| Auto-Generated Mapping | OneFS automatically maps Windows and UNIX identities. | Environments with minimal manual intervention. |
| Static Mapping | Admins manually define UID-to-SID mappings for full control. | Ensures consistency in mixed environments. |
| Rule-Based Mapping | PowerScale applies predefined rules to map users. | Large organizations with structured access controls. |
To create a static ID mapping:
isi auth mapping create --unix-id=1002 --sid=S-1-5-21-1002
This command ensures UID 1002 in UNIX maps directly to SID S-1-5-21-1002 in Windows, preventing inconsistencies.
Best Practices
Use static mapping for critical users (e.g., administrators).
Regularly review and update mappings to avoid orphaned permissions.
Enable mapping debug logs to troubleshoot issues:
isi auth mapping list --verbose
While PowerScale supports password-based authentication and SSH key authentication, many enterprises rely on Kerberos authentication for seamless Single Sign-On (SSO).
isi auth ads modify --kerberos-enable=yes
klist -k /etc/krb5.keytab
isi ntp status
Best Practices
Use multiple domain controllers for Kerberos failover.
Store keytab files securely and rotate them periodically.
Verify Kerberos authentication logs for troubleshooting:
isi auth ads view --verbose
PowerScale supports standard POSIX permissions but also includes special permissions like SetUID, SetGID, and Sticky Bit that are useful in shared environments.
| Permission | Symbol | Function | Use Case |
|---|---|---|---|
| SetUID | s |
Runs files with the owner’s privileges. | Allows non-root users to execute admin-level commands. |
| SetGID | s |
Files inherit group ownership when created. | Ensures files in a shared directory belong to the same group. |
| Sticky Bit | t |
Only file owners can delete files, even if others have write access. | Protects files in shared directories (e.g., /tmp). |
/shared inherit the group ownershipchmod g+s /shared
chmod u+s /usr/bin/custom_script
chmod +t /project_data
PowerScale supports both Windows ACLs (NTFS permissions) and NFSv4 ACLs, but since Windows ACLs use SIDs while NFS ACLs use UID/GIDs, compatibility issues can arise.
| Feature | SMB (NTFS ACLs) | NFS (POSIX ACLs) |
|---|---|---|
| Access Control | Based on Security Identifiers (SIDs) | Based on UID/GID |
| Permissions Granularity | Supports fine-grained permissions (e.g., read/execute/write by individual user) | Uses standard UNIX rwx permissions |
| Supported in PowerScale | Yes, for Windows clients | Yes, for Linux/UNIX clients |
isi nfs modify --nfs4-acl-enable=yes
Best Practices
getfacl and setfacl to manage NFSv4 ACLs manually.PowerScale supports RBAC, allowing administrators to assign specific roles to users, restricting access to sensitive configurations.
| Role | Permissions | Use Case |
|---|---|---|
| System Admin | Full administrative access. | Storage admins managing entire clusters. |
| Audit Admin | Can view logs but cannot modify settings. | Security teams reviewing access logs. |
| Backup Operator | Can manage backup/restore tasks but not other system settings. | Backup administrators. |
isi auth roles create --name=BackupOperator --permissions=Backup
isi auth roles assign --role=BackupOperator --user=johndoe
nobody user) and manual ID mapping (isi auth mapping create).isi auth ads modify --kerberos-enable=yes for SSO integration and ensure NTP synchronization.isi nfs modify --nfs4-acl-enable=yes) for better Windows ACL integration.isi auth roles create to define custom roles, restricting administrative access based on job function.By incorporating these enhancements, PowerScale provides a robust and secure identity and authorization framework, ensuring multi-protocol access control, enterprise authentication, and fine-grained permission management.
What is the primary difference between RBAC and ZRBAC in PowerScale?
RBAC applies roles cluster-wide, while ZRBAC applies roles within a specific access zone.
RBAC (Role-Based Access Control)
Controls administrative permissions across the entire cluster.
Example:
StorageAdmin role
→ can manage cluster configuration
ZRBAC (Zone Role-Based Access Control)
Limits administrative permissions to a specific access zone.
Example:
Access Zone: Finance
Admin → only manages resources inside that zone
ZRBAC is useful in multi-tenant environments where different administrators manage separate datasets.
Common mistake:
Many administrators assume RBAC automatically respects access zones, but RBAC operates at the cluster level, while ZRBAC enforces zone-level administration.
Demand Score: 85
Exam Relevance Score: 92
What is the purpose of identity mapping in PowerScale?
To translate user identities between different authentication systems.
In mixed environments, users may authenticate using:
Active Directory (Windows)
LDAP / UNIX identities
Because these systems use different identifiers:
Windows → SID
UNIX → UID / GID
OneFS uses identity mapping to translate between these identifiers so the same user can access files using SMB or NFS.
Example:
Windows SID
↓ mapping
UNIX UID
This allows consistent file access across multiple protocols.
Common mistake:
If identity mapping fails, users may appear as “nobody” or lose access permissions.
Demand Score: 88
Exam Relevance Score: 94
What permission model is typically used for SMB shares in PowerScale?
Access Control Lists (ACLs).
Two major permission models exist in PowerScale:
POSIX permissions
Owner
Group
Others
Common in UNIX/Linux environments.
ACL permissions
Provide fine-grained access control used primarily in Windows environments.
Example ACL entries:
User A → read
User B → modify
Group C → full control
SMB shares normally rely on NTFS-style ACLs, which allow more granular permission assignments.
Common mistake:
Some administrators attempt to manage SMB permissions using POSIX mode bits, which cannot provide the same detailed access control.
Demand Score: 81
Exam Relevance Score: 91
What happens if a user cannot be mapped between authentication systems in OneFS?
The system may assign the user to the “nobody” identity.
If OneFS cannot map a user between identity systems (for example between AD and LDAP), the user may be mapped to a fallback identity.
Example scenario:
Windows user SID
↓ mapping failure
UNIX UID → nobody
When this occurs:
the user may lose access to files
permissions may not match expected identities
Administrators typically resolve this by configuring:
proper identity mapping rules
consistent UID/GID assignments
directory service integration
Common mistake:
Assuming permission problems are caused by file ACLs when the real issue is identity mapping failure.
Demand Score: 84
Exam Relevance Score: 92