[16] | 1 | .TH mmauth 02/16/06 |
---|
| 2 | mmauth Command |
---|
| 3 | .SH "Name" |
---|
| 4 | .PP |
---|
| 5 | \fBmmauth\fR - Manages secure access to GPFS file systems. |
---|
| 6 | .SH "Synopsis" |
---|
| 7 | .PP |
---|
| 8 | \fBmmauth\fR \fBgenkey {new | commit}\fR |
---|
| 9 | .PP |
---|
| 10 | Or, |
---|
| 11 | .PP |
---|
| 12 | \fBmmauth\fR \fBadd\fR \fIRemoteClusterName\fR \fB-k\fR |
---|
| 13 | \fIKeyFile\fR \fB-l\fR \fICipherList\fR |
---|
| 14 | .PP |
---|
| 15 | Or, |
---|
| 16 | .PP |
---|
| 17 | \fBmmauth\fR \fBupdate\fR \fIRemoteClusterName\fR \fB-C\fR |
---|
| 18 | \fINewClusterName\fR \fB-k\fR \fIKeyFile\fR [\fB-l\fR |
---|
| 19 | \fICipherList\fR] |
---|
| 20 | .PP |
---|
| 21 | Or, |
---|
| 22 | .PP |
---|
| 23 | \fBmmauth\fR \fBdelete\fR \fB{\fR\fIRemoteClusterName\fR \fB| |
---|
| 24 | all }\fR |
---|
| 25 | .PP |
---|
| 26 | Or, |
---|
| 27 | .PP |
---|
| 28 | \fBmmauth\fR \fBgrant \fR \fB{\fR\fIRemoteClusterName\fR |
---|
| 29 | \fB| all }\fR \fB-f {\fR \fIDevice\fR \fB| all }\fR \fB[-a {\fB\fIrw\fR\fR | ro}\fR \fB] [-r |
---|
| 30 | {\fR\fIuid\fR\fB:\fR\fIgid\fR | \fB\fIno\fR\fR\fB}]\fR |
---|
| 31 | .PP |
---|
| 32 | Or, |
---|
| 33 | .PP |
---|
| 34 | \fBmmauth\fR \fBdeny\fR \fB{\fR\fIRemoteClusterName\fR |
---|
| 35 | \fB| all }\fR \fB-f {\fR \fIDevice\fR \fB| all }\fR |
---|
| 36 | .PP |
---|
| 37 | Or, |
---|
| 38 | .PP |
---|
| 39 | \fBmmauth\fR \fBshow\fR [\fIRemoteClusterName\fR \fB| |
---|
| 40 | all\fR] |
---|
| 41 | .SH "Description" |
---|
| 42 | .PP |
---|
| 43 | The \fBmmauth\fR command prepares a cluster to grant secure access to file |
---|
| 44 | systems owned locally. The \fBmmauth\fR command also prepares a |
---|
| 45 | cluster to receive secure access to file systems owned by another |
---|
| 46 | cluster. Use the \fBmmauth\fR command to generate a public/private |
---|
| 47 | key pair for the local cluster. A public/private key pair must be |
---|
| 48 | generated on both the cluster owning the file system and the cluster desiring |
---|
| 49 | access to the file system. The administrators of the clusters are |
---|
| 50 | responsible for exchanging the public portion of the public/private key |
---|
| 51 | pair. Use the \fBmmauth\fR command to add or delete permission for a |
---|
| 52 | cluster to mount file systems owned by the local cluster. |
---|
| 53 | .PP |
---|
| 54 | When a cluster generates a new public/private key pair, |
---|
| 55 | administrators of clusters participating in remote file system mounts are |
---|
| 56 | responsible for exchanging their respective public key file |
---|
| 57 | \fB/var/mmfs/ssl/id_rsa.pub\fR generated by this |
---|
| 58 | command. |
---|
| 59 | .PP |
---|
| 60 | The administrator of a cluster desiring to mount a file system from another |
---|
| 61 | cluster must provide the received key file as input to the \fBmmremotecluster\fR command. The administrator |
---|
| 62 | of a cluster allowing another cluster to mount a file system must provide the |
---|
| 63 | received key file to the \fBmmauth\fR command. |
---|
| 64 | .PP |
---|
| 65 | The keyword appearing after \fBmmauth\fR determines which action is |
---|
| 66 | performed: |
---|
| 67 | .PP |
---|
| 68 | .RS +3 |
---|
| 69 | \fBadd |
---|
| 70 | \fR |
---|
| 71 | .RE |
---|
| 72 | .RS +9 |
---|
| 73 | Adds a cluster and its associated public key to the list of clusters |
---|
| 74 | authorized to connect to this cluster for the purpose of mounting file systems |
---|
| 75 | owned by this cluster. |
---|
| 76 | .RE |
---|
| 77 | .PP |
---|
| 78 | .RS +3 |
---|
| 79 | \fBdelete |
---|
| 80 | \fR |
---|
| 81 | .RE |
---|
| 82 | .RS +9 |
---|
| 83 | Deletes a cluster and its associated public key from the list of clusters |
---|
| 84 | authorized to mount file systems owned by this cluster. |
---|
| 85 | .RE |
---|
| 86 | .PP |
---|
| 87 | .RS +3 |
---|
| 88 | \fBdeny |
---|
| 89 | \fR |
---|
| 90 | .RE |
---|
| 91 | .RS +9 |
---|
| 92 | Denies a cluster the authority to mount a specific file system owned by |
---|
| 93 | this cluster. |
---|
| 94 | .RE |
---|
| 95 | .PP |
---|
| 96 | .RS +3 |
---|
| 97 | \fBgenkey {new | commit} |
---|
| 98 | \fR |
---|
| 99 | .RE |
---|
| 100 | .RS +9 |
---|
| 101 | .PP |
---|
| 102 | .RS +3 |
---|
| 103 | \fBnew |
---|
| 104 | \fR |
---|
| 105 | .RE |
---|
| 106 | .RS +9 |
---|
| 107 | Generates a new public/private key pair for this cluster. The key |
---|
| 108 | pair is placed in \fB/var/mmfs/ssl\fR. This must be done at least |
---|
| 109 | once before \fBcipherList\fR, the GPFS configuration parameter that enables |
---|
| 110 | GPFS with OpenSSL, is set. |
---|
| 111 | .PP |
---|
| 112 | The new key is in addition to the currently in effect committed |
---|
| 113 | key. Both keys are accepted until the administrator runs \fBmmauth |
---|
| 114 | genkey commit\fR. |
---|
| 115 | .RE |
---|
| 116 | .PP |
---|
| 117 | .RS +3 |
---|
| 118 | \fBcommit |
---|
| 119 | \fR |
---|
| 120 | .RE |
---|
| 121 | .RS +9 |
---|
| 122 | Commits the new public/private key pair for this cluster. Once |
---|
| 123 | \fBmmauth genkey commit\fR is run, the old key pair will no longer be |
---|
| 124 | accepted, and remote clusters that have not updated their keys (by running |
---|
| 125 | \fBmmauth update\fR or |
---|
| 126 | \fBmmremotecluster |
---|
| 127 | update\fR) will be disconnected. |
---|
| 128 | .RE |
---|
| 129 | .RE |
---|
| 130 | .PP |
---|
| 131 | .RS +3 |
---|
| 132 | \fBgrant |
---|
| 133 | \fR |
---|
| 134 | .RE |
---|
| 135 | .RS +9 |
---|
| 136 | Allows a cluster to mount a specific file system owned by this |
---|
| 137 | cluster. |
---|
| 138 | .RE |
---|
| 139 | .PP |
---|
| 140 | .RS +3 |
---|
| 141 | \fBshow |
---|
| 142 | \fR |
---|
| 143 | .RE |
---|
| 144 | .RS +9 |
---|
| 145 | Shows the list of clusters authorized to mount file system owned by this |
---|
| 146 | cluster. |
---|
| 147 | .RE |
---|
| 148 | .PP |
---|
| 149 | .RS +3 |
---|
| 150 | \fBupdate |
---|
| 151 | \fR |
---|
| 152 | .RE |
---|
| 153 | .RS +9 |
---|
| 154 | Updates the public key and other information associated with a cluster |
---|
| 155 | authorized to mount file systems owned by this cluster. |
---|
| 156 | .PP |
---|
| 157 | When the local cluster name (or ".") is specified, \fBmmauth update |
---|
| 158 | -l\fR can be used to set the \fIcipherList\fR value for the local |
---|
| 159 | cluster. Note that you cannot use this command to change the name of |
---|
| 160 | the local cluster. Use the |
---|
| 161 | \fBmmchcluster\fR |
---|
| 162 | command for this purpose. |
---|
| 163 | .RE |
---|
| 164 | .SH "Parameters" |
---|
| 165 | .PP |
---|
| 166 | .RS +3 |
---|
| 167 | \fB\fIRemoteClusterName\fR |
---|
| 168 | \fR |
---|
| 169 | .RE |
---|
| 170 | .RS +9 |
---|
| 171 | Specifies the remote cluster name requesting access to local GPFS file |
---|
| 172 | systems. The value \fBall\fR indicates all remote clusters defined |
---|
| 173 | to the local cluster. |
---|
| 174 | .RE |
---|
| 175 | .SH "Options" |
---|
| 176 | .PP |
---|
| 177 | .RS +3 |
---|
| 178 | \fB-a {\fB\fIrw\fR\fR | ro} |
---|
| 179 | \fR |
---|
| 180 | .RE |
---|
| 181 | .RS +9 |
---|
| 182 | The type of access allowed: |
---|
| 183 | .PP |
---|
| 184 | .RS +3 |
---|
| 185 | \fBro |
---|
| 186 | \fR |
---|
| 187 | .RE |
---|
| 188 | .RS +9 |
---|
| 189 | Specifies read-only access. |
---|
| 190 | .RE |
---|
| 191 | .PP |
---|
| 192 | .RS +3 |
---|
| 193 | \fBrw |
---|
| 194 | \fR |
---|
| 195 | .RE |
---|
| 196 | .RS +9 |
---|
| 197 | Specifies read/write access. This is the default. |
---|
| 198 | .RE |
---|
| 199 | .RE |
---|
| 200 | .PP |
---|
| 201 | .RS +3 |
---|
| 202 | \fB-C \fINewClusterName\fR |
---|
| 203 | \fR |
---|
| 204 | .RE |
---|
| 205 | .RS +9 |
---|
| 206 | Specifies a new, fully-qualified cluster name for the already-defined |
---|
| 207 | cluster \fIremoteClusterName\fR. |
---|
| 208 | .RE |
---|
| 209 | .PP |
---|
| 210 | .RS +3 |
---|
| 211 | \fB-f \fIDevice \fR |
---|
| 212 | \fR |
---|
| 213 | .RE |
---|
| 214 | .RS +9 |
---|
| 215 | The device name for a file system owned by this cluster. The |
---|
| 216 | \fIDevice \fR argument is required. If \fBall\fR is specified, |
---|
| 217 | the command applies to all file systems owned by this cluster at the time that |
---|
| 218 | the command is issued. |
---|
| 219 | .RE |
---|
| 220 | .PP |
---|
| 221 | .RS +3 |
---|
| 222 | \fB-k \fIKeyFile\fR |
---|
| 223 | \fR |
---|
| 224 | .RE |
---|
| 225 | .RS +9 |
---|
| 226 | Specifies the public key file generated by the \fBmmauth\fR |
---|
| 227 | command in the cluster requesting to remotely mount the local GPFS file |
---|
| 228 | system. |
---|
| 229 | .RE |
---|
| 230 | .PP |
---|
| 231 | .RS +3 |
---|
| 232 | \fB-l \fICipherList\fR |
---|
| 233 | \fR |
---|
| 234 | .RE |
---|
| 235 | .RS +9 |
---|
| 236 | Specifies the cipher list to be associated with the cluster specified by |
---|
| 237 | \fIremoteClusterName\fR, when connecting to this cluster for the purpose of |
---|
| 238 | mounting file systems owned by this cluster. |
---|
| 239 | .PP |
---|
| 240 | See the Frequently Asked Questions at: publib.boulder.ibm.com/infocenter/ |
---|
| 241 | clresctr/topic/com.ibm.cluster.gpfs.doc/gpfs_faqs/ |
---|
| 242 | gpfsclustersfaq.html for a list of the ciphers supported by GPFS. |
---|
| 243 | .RE |
---|
| 244 | .PP |
---|
| 245 | .RS +3 |
---|
| 246 | \fB-r {\fIuid\fR:\fIgid\fR | \fB\fIno\fR\fR} |
---|
| 247 | \fR |
---|
| 248 | .RE |
---|
| 249 | .RS +9 |
---|
| 250 | Specifies a root credentials remapping (\fIroot squash\fR) |
---|
| 251 | option. The UID and GID of all processes with root credentials from the |
---|
| 252 | remote cluster will be remapped to the specified values. |
---|
| 253 | .PP |
---|
| 254 | The default is not to remap the root UID and GID. The \fIuid\fR |
---|
| 255 | and \fIgid\fR must be specified as unsigned integers or as symbolic names |
---|
| 256 | that can be resolved by the operating system to a valid UID and GID. |
---|
| 257 | Specifying \fBno\fR, \fBoff\fR, or \fBDEFAULT\fR turns off the |
---|
| 258 | remapping. |
---|
| 259 | .RE |
---|
| 260 | .SH "Exit status" |
---|
| 261 | .PP |
---|
| 262 | .PP |
---|
| 263 | .RS +3 |
---|
| 264 | \fB0 |
---|
| 265 | \fR |
---|
| 266 | .RE |
---|
| 267 | .RS +9 |
---|
| 268 | Successful completion. After a successful completion of the |
---|
| 269 | \fBmmauth\fR command, the configuration change request will have been |
---|
| 270 | propagated to all nodes in the cluster. |
---|
| 271 | .RE |
---|
| 272 | .PP |
---|
| 273 | .RS +3 |
---|
| 274 | \fBnonzero |
---|
| 275 | \fR |
---|
| 276 | .RE |
---|
| 277 | .RS +9 |
---|
| 278 | A failure has occurred. |
---|
| 279 | .RE |
---|
| 280 | .SH "Security" |
---|
| 281 | .PP |
---|
| 282 | You must have root authority to run the \fBmmauth\fR command. |
---|
| 283 | .PP |
---|
| 284 | You may issue the \fBmmauth\fR command from any node in the GPFS |
---|
| 285 | cluster. |
---|
| 286 | .SH "Examples" |
---|
| 287 | .RS +3 |
---|
| 288 | .HP 3 |
---|
| 289 | 1. This is an example of an \fB mmauth genkey new\fR command: |
---|
| 290 | .sp |
---|
| 291 | .nf |
---|
| 292 | mmauth genkey new |
---|
| 293 | .fi |
---|
| 294 | .sp |
---|
| 295 | The output is similar to this: |
---|
| 296 | .sp |
---|
| 297 | .nf |
---|
| 298 | Generating RSA private key, 512 bit long modulus |
---|
| 299 | \&.\&.\&..........++++++++++++.++++++++++++ |
---|
| 300 | e is 65537 (0x10001) |
---|
| 301 | mmauth: Command successfully completed |
---|
| 302 | mmauth: Propagating the cluster configuration data to all |
---|
| 303 | affected nodes. This is an asynchronous process. |
---|
| 304 | .fi |
---|
| 305 | .sp |
---|
| 306 | .HP 3 |
---|
| 307 | 2. This is an example of an \fB mmauth genkey commit\fR |
---|
| 308 | command: |
---|
| 309 | .sp |
---|
| 310 | .nf |
---|
| 311 | mmauth genkey commit |
---|
| 312 | .fi |
---|
| 313 | .sp |
---|
| 314 | The output is similar to this: |
---|
| 315 | .sp |
---|
| 316 | .nf |
---|
| 317 | mmauth: Command successfully completed |
---|
| 318 | mmauth: Propagating the cluster configuration data to all |
---|
| 319 | affected nodes. This is an asynchronous process. |
---|
| 320 | .fi |
---|
| 321 | .sp |
---|
| 322 | .HP 3 |
---|
| 323 | 3. This is an example of an \fB mmauth add\fR command: |
---|
| 324 | .sp |
---|
| 325 | .nf |
---|
| 326 | mmauth add clustA.kgn.ibm.com -k /u/admin/keys/clustA.pub\ |
---|
| 327 | .fi |
---|
| 328 | .sp |
---|
| 329 | The output is similar to this: |
---|
| 330 | .sp |
---|
| 331 | .nf |
---|
| 332 | mmauth: Propagating the changes to all affected nodes. |
---|
| 333 | This is an asynchronous process. |
---|
| 334 | .fi |
---|
| 335 | .sp |
---|
| 336 | .HP 3 |
---|
| 337 | 4. This is an example of an \fB mmauth update\fR command: |
---|
| 338 | .sp |
---|
| 339 | .nf |
---|
| 340 | mmauth update clustA.kgn.ibm.com -k /u/admin/keys/clustA_new.pub\ |
---|
| 341 | .fi |
---|
| 342 | .sp |
---|
| 343 | The output is similar to this: |
---|
| 344 | .sp |
---|
| 345 | .nf |
---|
| 346 | mmauth: Propagating the changes to all affected nodes. |
---|
| 347 | This is an asynchronous process. |
---|
| 348 | .fi |
---|
| 349 | .sp |
---|
| 350 | .HP 3 |
---|
| 351 | 5. This is an example of an \fBmmauth grant\fR command: |
---|
| 352 | .sp |
---|
| 353 | .nf |
---|
| 354 | mmauth grant clustA.kgn.ibm.com -f /dev/gpfs1 -a ro |
---|
| 355 | .fi |
---|
| 356 | .sp |
---|
| 357 | The output is similar to this: |
---|
| 358 | .sp |
---|
| 359 | .nf |
---|
| 360 | mmauth:Propagating the changes to all affected nodes. |
---|
| 361 | This is an asynchronous process. |
---|
| 362 | .fi |
---|
| 363 | .sp |
---|
| 364 | .HP 3 |
---|
| 365 | 6. This is an example on how to set or change the cipher list for the |
---|
| 366 | local cluster: |
---|
| 367 | .sp |
---|
| 368 | .nf |
---|
| 369 | mmauth update . -l NULL-SHA |
---|
| 370 | .fi |
---|
| 371 | .sp |
---|
| 372 | The output is similar to this: |
---|
| 373 | .sp |
---|
| 374 | .nf |
---|
| 375 | mmauth: Command successfully completed |
---|
| 376 | mmauth: Propagating the changes to all affected nodes. |
---|
| 377 | This is an asynchronous process. |
---|
| 378 | .fi |
---|
| 379 | .sp |
---|
| 380 | .HP 3 |
---|
| 381 | 7. This is an example of an \fBmmauth show\fR command: |
---|
| 382 | .sp |
---|
| 383 | .nf |
---|
| 384 | mmauth show all |
---|
| 385 | .fi |
---|
| 386 | .sp |
---|
| 387 | The output is similar to this: |
---|
| 388 | .sp |
---|
| 389 | .nf |
---|
| 390 | Cluster name: clustA.kgn.ibm.com |
---|
| 391 | Cipher list: NULL-SHA |
---|
| 392 | SHA digest: a3917c8282fca7a27d951566940768dcd241902b |
---|
| 393 | File system access: gpfs1 (ro)\ |
---|
| 394 | .fi |
---|
| 395 | .sp |
---|
| 396 | .sp |
---|
| 397 | .nf |
---|
| 398 | Cluster name: clustB.kgn.ibm.com (this cluster) |
---|
| 399 | Cipher list: NULL-SHA |
---|
| 400 | SHA digest: 6ba5e3c1038246fe30f3fc8c1181fbb2130d7a8a |
---|
| 401 | SHA digest (new): 3c1038246fe30f3fc8c1181fbb2130d7a8a9ab4d |
---|
| 402 | File system access: (all rw) |
---|
| 403 | .fi |
---|
| 404 | .sp |
---|
| 405 | .sp |
---|
| 406 | For \fBclustB.kgn.ibm.com\fR, the \fBmmauth |
---|
| 407 | genkey new\fR command has been issued, but the \fBmmauth genkey commit\fR |
---|
| 408 | command has not yet been issued. |
---|
| 409 | .sp |
---|
| 410 | For more information on the SHA digest, see |
---|
| 411 | \fIGeneral Parallel File System: Problem |
---|
| 412 | Determination Guide\fR and search on \fISHA digest\fR. |
---|
| 413 | .HP 3 |
---|
| 414 | 8. This is an example of an \fBmmauth deny\fR command: |
---|
| 415 | .sp |
---|
| 416 | .nf |
---|
| 417 | mmauth deny clustA.kgn.ibm.com -f all |
---|
| 418 | .fi |
---|
| 419 | .sp |
---|
| 420 | The output is similar to this: |
---|
| 421 | .sp |
---|
| 422 | .nf |
---|
| 423 | mmauth:Propagating the changes to all affected nodes. |
---|
| 424 | This is an asynchronous process. |
---|
| 425 | .fi |
---|
| 426 | .sp |
---|
| 427 | .HP 3 |
---|
| 428 | 9. This is an example of an \fBmmauth delete\fR command: |
---|
| 429 | .sp |
---|
| 430 | .nf |
---|
| 431 | mmauth delete all |
---|
| 432 | .fi |
---|
| 433 | .sp |
---|
| 434 | The output is similar to this: |
---|
| 435 | .sp |
---|
| 436 | .nf |
---|
| 437 | mmauth: Propagating the changes to all affected nodes. |
---|
| 438 | This is an asynchronous process. |
---|
| 439 | .fi |
---|
| 440 | .sp |
---|
| 441 | .RE |
---|
| 442 | .SH "See also" |
---|
| 443 | .PP |
---|
| 444 | mmremotefs Command |
---|
| 445 | .PP |
---|
| 446 | mmremotecluster Command |
---|
| 447 | .PP |
---|
| 448 | \fIAccessing GPFS file systems from other |
---|
| 449 | GPFS clusters\fR in |
---|
| 450 | \fIGeneral Parallel |
---|
| 451 | File System: Advanced Administration Guide\fR. |
---|
| 452 | .SH "Location" |
---|
| 453 | .PP |
---|
| 454 | \fB/usr/lpp/mmfs/bin\fR |
---|
| 455 | .PP |
---|