This section describes how to configure access control permissions for files and directories to improve access security.
The Modify Access Control page is displayed on the right.
Super User Certificate and Kerberos Configuration are used in Security mode and are not required in Simple mode.
Parameter |
Description |
|---|---|
Token Authentication |
Whether to enable token authentication. After token authentication is enabled, the token carries user information, which is used to authenticate users in service operations, such as data download. |
UMASK |
UMASK used for creating a file or directory. It is used to control the default permissions. If this parameter is left blank, files and directories can be read and write.
NOTE:
The UMASK is a three-bit octal digit. |
Super User Group |
Name of the super user group. The super user group has all operation permissions of namespaces. [Value range]
|
Mapping Rule |
Mapping rule from Kerberos to the local user.
The following two formats are supported:
[Example] RULE:[1:$1@$0](hdfs@EXAMPLE.COM)s/.*/hdfs/ |
RPC Encryption Mode |
RPC encryption mode. Possible options are authentication, integrity, and privacy. |
Parameter |
Description |
|---|---|
Proxy User |
Name of a proxy user. [Value range]
|
Host |
Indicates a host IP address. [Value range]
|
User Group |
Indicates a host group name. [Value range]
|
User |
Indicates a user name. [Value range]
|