Access Control in Distributed Environment
Once a connection between a Consumer Server and a Provider Server is established, the Consumer Server authenticates on the Provider Server with specific user credentials valid on the Provider Server. This grants the Consumer Server permissions on the Provider Server according to the permissions table associated with the authentication credentials. All subsequent operations after authentication initiated by the Consumer Server or its operators follow these permissions.
Simply speaking, the Consumer Server is essentially a user that has connected and logged in to the Provider Server.
Illustrative Example
Suppose the following configuration:
Server A is a Provider, and has a user account User A, which has permission to access the context with context path
target_context
.According to the Provider Configuration of Server A, the local path of the context
target_context
at Server B ismount.target_context
.
Server B is a Consumer, and has a user account User B with permission to access the context with context path
mount.target_context
.Server B will authenticate with Server A, using the credentials of User A, allowing Server B to access
target_context
, and mount it with context pathmount.target_context
.An operator connecting to Server B authenticates with the User B credentials, and is able to access the context
mount.target_context
.
Was this page helpful?