1 | .TH mmauth 02/16/06 |
---|
2 | mmauth Command |
---|
3 | .SH "Name" |
---|
4 | .PP |
---|
5 | \fBmmauth\fR - Manages secure access to GPFS file systems. |
---|
6 | .SH "Synopsis" |
---|
7 | .PP |
---|
8 | \fBmmauth\fR \fBgenkey {new | commit}\fR |
---|
9 | .PP |
---|
10 | Or, |
---|
11 | .PP |
---|
12 | \fBmmauth\fR \fBadd\fR \fIRemoteClusterName\fR \fB-k\fR |
---|
13 | \fIKeyFile\fR \fB-l\fR \fICipherList\fR |
---|
14 | .PP |
---|
15 | Or, |
---|
16 | .PP |
---|
17 | \fBmmauth\fR \fBupdate\fR \fIRemoteClusterName\fR \fB-C\fR |
---|
18 | \fINewClusterName\fR \fB-k\fR \fIKeyFile\fR [\fB-l\fR |
---|
19 | \fICipherList\fR] |
---|
20 | .PP |
---|
21 | Or, |
---|
22 | .PP |
---|
23 | \fBmmauth\fR \fBdelete\fR \fB{\fR\fIRemoteClusterName\fR \fB| |
---|
24 | all }\fR |
---|
25 | .PP |
---|
26 | Or, |
---|
27 | .PP |
---|
28 | \fBmmauth\fR \fBgrant \fR \fB{\fR\fIRemoteClusterName\fR |
---|
29 | \fB| all }\fR \fB-f {\fR \fIDevice\fR \fB| all }\fR \fB[-a {\fB\fIrw\fR\fR | ro}\fR \fB] [-r |
---|
30 | {\fR\fIuid\fR\fB:\fR\fIgid\fR | \fB\fIno\fR\fR\fB}]\fR |
---|
31 | .PP |
---|
32 | Or, |
---|
33 | .PP |
---|
34 | \fBmmauth\fR \fBdeny\fR \fB{\fR\fIRemoteClusterName\fR |
---|
35 | \fB| all }\fR \fB-f {\fR \fIDevice\fR \fB| all }\fR |
---|
36 | .PP |
---|
37 | Or, |
---|
38 | .PP |
---|
39 | \fBmmauth\fR \fBshow\fR [\fIRemoteClusterName\fR \fB| |
---|
40 | all\fR] |
---|
41 | .SH "Description" |
---|
42 | .PP |
---|
43 | The \fBmmauth\fR command prepares a cluster to grant secure access to file |
---|
44 | systems owned locally. The \fBmmauth\fR command also prepares a |
---|
45 | cluster to receive secure access to file systems owned by another |
---|
46 | cluster. Use the \fBmmauth\fR command to generate a public/private |
---|
47 | key pair for the local cluster. A public/private key pair must be |
---|
48 | generated on both the cluster owning the file system and the cluster desiring |
---|
49 | access to the file system. The administrators of the clusters are |
---|
50 | responsible for exchanging the public portion of the public/private key |
---|
51 | pair. Use the \fBmmauth\fR command to add or delete permission for a |
---|
52 | cluster to mount file systems owned by the local cluster. |
---|
53 | .PP |
---|
54 | When a cluster generates a new public/private key pair, |
---|
55 | administrators of clusters participating in remote file system mounts are |
---|
56 | responsible for exchanging their respective public key file |
---|
57 | \fB/var/mmfs/ssl/id_rsa.pub\fR generated by this |
---|
58 | command. |
---|
59 | .PP |
---|
60 | The administrator of a cluster desiring to mount a file system from another |
---|
61 | cluster must provide the received key file as input to the \fBmmremotecluster\fR command. The administrator |
---|
62 | of a cluster allowing another cluster to mount a file system must provide the |
---|
63 | received key file to the \fBmmauth\fR command. |
---|
64 | .PP |
---|
65 | The keyword appearing after \fBmmauth\fR determines which action is |
---|
66 | performed: |
---|
67 | .PP |
---|
68 | .RS +3 |
---|
69 | \fBadd |
---|
70 | \fR |
---|
71 | .RE |
---|
72 | .RS +9 |
---|
73 | Adds a cluster and its associated public key to the list of clusters |
---|
74 | authorized to connect to this cluster for the purpose of mounting file systems |
---|
75 | owned by this cluster. |
---|
76 | .RE |
---|
77 | .PP |
---|
78 | .RS +3 |
---|
79 | \fBdelete |
---|
80 | \fR |
---|
81 | .RE |
---|
82 | .RS +9 |
---|
83 | Deletes a cluster and its associated public key from the list of clusters |
---|
84 | authorized to mount file systems owned by this cluster. |
---|
85 | .RE |
---|
86 | .PP |
---|
87 | .RS +3 |
---|
88 | \fBdeny |
---|
89 | \fR |
---|
90 | .RE |
---|
91 | .RS +9 |
---|
92 | Denies a cluster the authority to mount a specific file system owned by |
---|
93 | this cluster. |
---|
94 | .RE |
---|
95 | .PP |
---|
96 | .RS +3 |
---|
97 | \fBgenkey {new | commit} |
---|
98 | \fR |
---|
99 | .RE |
---|
100 | .RS +9 |
---|
101 | .PP |
---|
102 | .RS +3 |
---|
103 | \fBnew |
---|
104 | \fR |
---|
105 | .RE |
---|
106 | .RS +9 |
---|
107 | Generates a new public/private key pair for this cluster. The key |
---|
108 | pair is placed in \fB/var/mmfs/ssl\fR. This must be done at least |
---|
109 | once before \fBcipherList\fR, the GPFS configuration parameter that enables |
---|
110 | GPFS with OpenSSL, is set. |
---|
111 | .PP |
---|
112 | The new key is in addition to the currently in effect committed |
---|
113 | key. Both keys are accepted until the administrator runs \fBmmauth |
---|
114 | genkey commit\fR. |
---|
115 | .RE |
---|
116 | .PP |
---|
117 | .RS +3 |
---|
118 | \fBcommit |
---|
119 | \fR |
---|
120 | .RE |
---|
121 | .RS +9 |
---|
122 | Commits the new public/private key pair for this cluster. Once |
---|
123 | \fBmmauth genkey commit\fR is run, the old key pair will no longer be |
---|
124 | accepted, and remote clusters that have not updated their keys (by running |
---|
125 | \fBmmauth update\fR or |
---|
126 | \fBmmremotecluster |
---|
127 | update\fR) will be disconnected. |
---|
128 | .RE |
---|
129 | .RE |
---|
130 | .PP |
---|
131 | .RS +3 |
---|
132 | \fBgrant |
---|
133 | \fR |
---|
134 | .RE |
---|
135 | .RS +9 |
---|
136 | Allows a cluster to mount a specific file system owned by this |
---|
137 | cluster. |
---|
138 | .RE |
---|
139 | .PP |
---|
140 | .RS +3 |
---|
141 | \fBshow |
---|
142 | \fR |
---|
143 | .RE |
---|
144 | .RS +9 |
---|
145 | Shows the list of clusters authorized to mount file system owned by this |
---|
146 | cluster. |
---|
147 | .RE |
---|
148 | .PP |
---|
149 | .RS +3 |
---|
150 | \fBupdate |
---|
151 | \fR |
---|
152 | .RE |
---|
153 | .RS +9 |
---|
154 | Updates the public key and other information associated with a cluster |
---|
155 | authorized to mount file systems owned by this cluster. |
---|
156 | .PP |
---|
157 | When the local cluster name (or ".") is specified, \fBmmauth update |
---|
158 | -l\fR can be used to set the \fIcipherList\fR value for the local |
---|
159 | cluster. Note that you cannot use this command to change the name of |
---|
160 | the local cluster. Use the |
---|
161 | \fBmmchcluster\fR |
---|
162 | command for this purpose. |
---|
163 | .RE |
---|
164 | .SH "Parameters" |
---|
165 | .PP |
---|
166 | .RS +3 |
---|
167 | \fB\fIRemoteClusterName\fR |
---|
168 | \fR |
---|
169 | .RE |
---|
170 | .RS +9 |
---|
171 | Specifies the remote cluster name requesting access to local GPFS file |
---|
172 | systems. The value \fBall\fR indicates all remote clusters defined |
---|
173 | to the local cluster. |
---|
174 | .RE |
---|
175 | .SH "Options" |
---|
176 | .PP |
---|
177 | .RS +3 |
---|
178 | \fB-a {\fB\fIrw\fR\fR | ro} |
---|
179 | \fR |
---|
180 | .RE |
---|
181 | .RS +9 |
---|
182 | The type of access allowed: |
---|
183 | .PP |
---|
184 | .RS +3 |
---|
185 | \fBro |
---|
186 | \fR |
---|
187 | .RE |
---|
188 | .RS +9 |
---|
189 | Specifies read-only access. |
---|
190 | .RE |
---|
191 | .PP |
---|
192 | .RS +3 |
---|
193 | \fBrw |
---|
194 | \fR |
---|
195 | .RE |
---|
196 | .RS +9 |
---|
197 | Specifies read/write access. This is the default. |
---|
198 | .RE |
---|
199 | .RE |
---|
200 | .PP |
---|
201 | .RS +3 |
---|
202 | \fB-C \fINewClusterName\fR |
---|
203 | \fR |
---|
204 | .RE |
---|
205 | .RS +9 |
---|
206 | Specifies a new, fully-qualified cluster name for the already-defined |
---|
207 | cluster \fIremoteClusterName\fR. |
---|
208 | .RE |
---|
209 | .PP |
---|
210 | .RS +3 |
---|
211 | \fB-f \fIDevice \fR |
---|
212 | \fR |
---|
213 | .RE |
---|
214 | .RS +9 |
---|
215 | The device name for a file system owned by this cluster. The |
---|
216 | \fIDevice \fR argument is required. If \fBall\fR is specified, |
---|
217 | the command applies to all file systems owned by this cluster at the time that |
---|
218 | the command is issued. |
---|
219 | .RE |
---|
220 | .PP |
---|
221 | .RS +3 |
---|
222 | \fB-k \fIKeyFile\fR |
---|
223 | \fR |
---|
224 | .RE |
---|
225 | .RS +9 |
---|
226 | Specifies the public key file generated by the \fBmmauth\fR |
---|
227 | command in the cluster requesting to remotely mount the local GPFS file |
---|
228 | system. |
---|
229 | .RE |
---|
230 | .PP |
---|
231 | .RS +3 |
---|
232 | \fB-l \fICipherList\fR |
---|
233 | \fR |
---|
234 | .RE |
---|
235 | .RS +9 |
---|
236 | Specifies the cipher list to be associated with the cluster specified by |
---|
237 | \fIremoteClusterName\fR, when connecting to this cluster for the purpose of |
---|
238 | mounting file systems owned by this cluster. |
---|
239 | .PP |
---|
240 | See the Frequently Asked Questions at: publib.boulder.ibm.com/infocenter/ |
---|
241 | clresctr/topic/com.ibm.cluster.gpfs.doc/gpfs_faqs/ |
---|
242 | gpfsclustersfaq.html for a list of the ciphers supported by GPFS. |
---|
243 | .RE |
---|
244 | .PP |
---|
245 | .RS +3 |
---|
246 | \fB-r {\fIuid\fR:\fIgid\fR | \fB\fIno\fR\fR} |
---|
247 | \fR |
---|
248 | .RE |
---|
249 | .RS +9 |
---|
250 | Specifies a root credentials remapping (\fIroot squash\fR) |
---|
251 | option. The UID and GID of all processes with root credentials from the |
---|
252 | remote cluster will be remapped to the specified values. |
---|
253 | .PP |
---|
254 | The default is not to remap the root UID and GID. The \fIuid\fR |
---|
255 | and \fIgid\fR must be specified as unsigned integers or as symbolic names |
---|
256 | that can be resolved by the operating system to a valid UID and GID. |
---|
257 | Specifying \fBno\fR, \fBoff\fR, or \fBDEFAULT\fR turns off the |
---|
258 | remapping. |
---|
259 | .RE |
---|
260 | .SH "Exit status" |
---|
261 | .PP |
---|
262 | .PP |
---|
263 | .RS +3 |
---|
264 | \fB0 |
---|
265 | \fR |
---|
266 | .RE |
---|
267 | .RS +9 |
---|
268 | Successful completion. After a successful completion of the |
---|
269 | \fBmmauth\fR command, the configuration change request will have been |
---|
270 | propagated to all nodes in the cluster. |
---|
271 | .RE |
---|
272 | .PP |
---|
273 | .RS +3 |
---|
274 | \fBnonzero |
---|
275 | \fR |
---|
276 | .RE |
---|
277 | .RS +9 |
---|
278 | A failure has occurred. |
---|
279 | .RE |
---|
280 | .SH "Security" |
---|
281 | .PP |
---|
282 | You must have root authority to run the \fBmmauth\fR command. |
---|
283 | .PP |
---|
284 | You may issue the \fBmmauth\fR command from any node in the GPFS |
---|
285 | cluster. |
---|
286 | .SH "Examples" |
---|
287 | .RS +3 |
---|
288 | .HP 3 |
---|
289 | 1. This is an example of an \fB mmauth genkey new\fR command: |
---|
290 | .sp |
---|
291 | .nf |
---|
292 | mmauth genkey new |
---|
293 | .fi |
---|
294 | .sp |
---|
295 | The output is similar to this: |
---|
296 | .sp |
---|
297 | .nf |
---|
298 | Generating RSA private key, 512 bit long modulus |
---|
299 | \&.\&.\&..........++++++++++++.++++++++++++ |
---|
300 | e is 65537 (0x10001) |
---|
301 | mmauth: Command successfully completed |
---|
302 | mmauth: Propagating the cluster configuration data to all |
---|
303 | affected nodes. This is an asynchronous process. |
---|
304 | .fi |
---|
305 | .sp |
---|
306 | .HP 3 |
---|
307 | 2. This is an example of an \fB mmauth genkey commit\fR |
---|
308 | command: |
---|
309 | .sp |
---|
310 | .nf |
---|
311 | mmauth genkey commit |
---|
312 | .fi |
---|
313 | .sp |
---|
314 | The output is similar to this: |
---|
315 | .sp |
---|
316 | .nf |
---|
317 | mmauth: Command successfully completed |
---|
318 | mmauth: Propagating the cluster configuration data to all |
---|
319 | affected nodes. This is an asynchronous process. |
---|
320 | .fi |
---|
321 | .sp |
---|
322 | .HP 3 |
---|
323 | 3. This is an example of an \fB mmauth add\fR command: |
---|
324 | .sp |
---|
325 | .nf |
---|
326 | mmauth add clustA.kgn.ibm.com -k /u/admin/keys/clustA.pub\ |
---|
327 | .fi |
---|
328 | .sp |
---|
329 | The output is similar to this: |
---|
330 | .sp |
---|
331 | .nf |
---|
332 | mmauth: Propagating the changes to all affected nodes. |
---|
333 | This is an asynchronous process. |
---|
334 | .fi |
---|
335 | .sp |
---|
336 | .HP 3 |
---|
337 | 4. This is an example of an \fB mmauth update\fR command: |
---|
338 | .sp |
---|
339 | .nf |
---|
340 | mmauth update clustA.kgn.ibm.com -k /u/admin/keys/clustA_new.pub\ |
---|
341 | .fi |
---|
342 | .sp |
---|
343 | The output is similar to this: |
---|
344 | .sp |
---|
345 | .nf |
---|
346 | mmauth: Propagating the changes to all affected nodes. |
---|
347 | This is an asynchronous process. |
---|
348 | .fi |
---|
349 | .sp |
---|
350 | .HP 3 |
---|
351 | 5. This is an example of an \fBmmauth grant\fR command: |
---|
352 | .sp |
---|
353 | .nf |
---|
354 | mmauth grant clustA.kgn.ibm.com -f /dev/gpfs1 -a ro |
---|
355 | .fi |
---|
356 | .sp |
---|
357 | The output is similar to this: |
---|
358 | .sp |
---|
359 | .nf |
---|
360 | mmauth:Propagating the changes to all affected nodes. |
---|
361 | This is an asynchronous process. |
---|
362 | .fi |
---|
363 | .sp |
---|
364 | .HP 3 |
---|
365 | 6. This is an example on how to set or change the cipher list for the |
---|
366 | local cluster: |
---|
367 | .sp |
---|
368 | .nf |
---|
369 | mmauth update . -l NULL-SHA |
---|
370 | .fi |
---|
371 | .sp |
---|
372 | The output is similar to this: |
---|
373 | .sp |
---|
374 | .nf |
---|
375 | mmauth: Command successfully completed |
---|
376 | mmauth: Propagating the changes to all affected nodes. |
---|
377 | This is an asynchronous process. |
---|
378 | .fi |
---|
379 | .sp |
---|
380 | .HP 3 |
---|
381 | 7. This is an example of an \fBmmauth show\fR command: |
---|
382 | .sp |
---|
383 | .nf |
---|
384 | mmauth show all |
---|
385 | .fi |
---|
386 | .sp |
---|
387 | The output is similar to this: |
---|
388 | .sp |
---|
389 | .nf |
---|
390 | Cluster name: clustA.kgn.ibm.com |
---|
391 | Cipher list: NULL-SHA |
---|
392 | SHA digest: a3917c8282fca7a27d951566940768dcd241902b |
---|
393 | File system access: gpfs1 (ro)\ |
---|
394 | .fi |
---|
395 | .sp |
---|
396 | .sp |
---|
397 | .nf |
---|
398 | Cluster name: clustB.kgn.ibm.com (this cluster) |
---|
399 | Cipher list: NULL-SHA |
---|
400 | SHA digest: 6ba5e3c1038246fe30f3fc8c1181fbb2130d7a8a |
---|
401 | SHA digest (new): 3c1038246fe30f3fc8c1181fbb2130d7a8a9ab4d |
---|
402 | File system access: (all rw) |
---|
403 | .fi |
---|
404 | .sp |
---|
405 | .sp |
---|
406 | For \fBclustB.kgn.ibm.com\fR, the \fBmmauth |
---|
407 | genkey new\fR command has been issued, but the \fBmmauth genkey commit\fR |
---|
408 | command has not yet been issued. |
---|
409 | .sp |
---|
410 | For more information on the SHA digest, see |
---|
411 | \fIGeneral Parallel File System: Problem |
---|
412 | Determination Guide\fR and search on \fISHA digest\fR. |
---|
413 | .HP 3 |
---|
414 | 8. This is an example of an \fBmmauth deny\fR command: |
---|
415 | .sp |
---|
416 | .nf |
---|
417 | mmauth deny clustA.kgn.ibm.com -f all |
---|
418 | .fi |
---|
419 | .sp |
---|
420 | The output is similar to this: |
---|
421 | .sp |
---|
422 | .nf |
---|
423 | mmauth:Propagating the changes to all affected nodes. |
---|
424 | This is an asynchronous process. |
---|
425 | .fi |
---|
426 | .sp |
---|
427 | .HP 3 |
---|
428 | 9. This is an example of an \fBmmauth delete\fR command: |
---|
429 | .sp |
---|
430 | .nf |
---|
431 | mmauth delete all |
---|
432 | .fi |
---|
433 | .sp |
---|
434 | The output is similar to this: |
---|
435 | .sp |
---|
436 | .nf |
---|
437 | mmauth: Propagating the changes to all affected nodes. |
---|
438 | This is an asynchronous process. |
---|
439 | .fi |
---|
440 | .sp |
---|
441 | .RE |
---|
442 | .SH "See also" |
---|
443 | .PP |
---|
444 | mmremotefs Command |
---|
445 | .PP |
---|
446 | mmremotecluster Command |
---|
447 | .PP |
---|
448 | \fIAccessing GPFS file systems from other |
---|
449 | GPFS clusters\fR in |
---|
450 | \fIGeneral Parallel |
---|
451 | File System: Advanced Administration Guide\fR. |
---|
452 | .SH "Location" |
---|
453 | .PP |
---|
454 | \fB/usr/lpp/mmfs/bin\fR |
---|
455 | .PP |
---|