Access Control in Distributed Environment

Once a connection between a Consumer Server and a Provider Server is established, the Consumer Server authenticates on the Provider Server with specific user credentials valid on the Provider Server. This grants the Consumer Server permissions on the Provider Server according to the permissions table associated with the authentication credentials. All subsequent operations after authentication initiated by the Consumer Server or its operators follow these permissions.

Simply speaking, the Consumer Server is essentially a user that has connected and logged in to the Provider Server.

Illustrative Example

Suppose the following configuration:

  • Server A is a Provider, and has a user account User A, which has permission to access the context with context path target_context.

    • According to the Provider Configuration of Server A, the local path of the context target_context at Server B is mount.target_context.

  • Server B is a Consumer, and has a user account User B with permission to access the context with context path mount.target_context.

  • Server B will authenticate with Server A, using the credentials of User A, allowing Server B to access target_context, and mount it with context path mount.target_context.

  • An operator connecting to Server B authenticates with the User B credentials, and is able to access the context mount.target_context.

Was this page helpful?