This operation enables you to configure access control permissions for files and directories to improve access security.
The Modify Access Control page is displayed on the right.
You can also click the name of the desired account, click the Access Control tab on the General page, and click Modify.
Super User Certificate and Kerberos Configuration are used in Security mode and are not required in Simple mode.
Parameter |
Description |
|---|---|
Token Authentication |
Indicates whether to enable token authentication. After token authentication is enabled, the token carries user information, which is used to authenticate users in service operations, such as data download. |
UMASK |
Indicates the UMASK used for creating a file or directory, which is used to control the default permission. If this parameter is left blank, files and directories can be read and write. NOTE:
The value is a three-digit octal digit. |
Super User Group |
Indicates the name of the super user group. The super user group has all operation permissions of namespaces. [Value range]
|
Mapping Rule |
Indicates the mapping rules from Kerberos to local users. The following two formats are supported:
[Example] RULE:[1:$1@$0](hdfs@EXAMPLE.COM)s/.*/hdfs/ |
RPC Encryption Mode |
Indicates the RPC encryption mode. Possible options are authentication, integrity, and privacy. |
Parameter |
Description |
|---|---|
Proxy User |
Indicates the name of a proxy user. [Value range]
|
Host |
Indicates a host IP address. [Value range]
|
User Group |
Indicates a host group name. [Value range]
|
User |
Indicates a user name. [Value range]
|