Controlling user resources
CCI verifies the user who executes the command has been authenticated
already. After that, CCI obtains the access authority of the resource groups
that are configured on the user roles, and then compares the access authority
of the user and the specified resources.
Checking resource authorities
If the access is not permitted by comparing the access authorities of the
resource groups configured on the user roles and the specified resource, CCI
rejects the command with an error code "EX_EGPERM". If the resource
groups are defined among the large storage systems, the specified resource
is compared with the resource specified by obtaining the access authority
configured to each large storage system.
Target commands
CCI checks resource authorities on the following commands that use
command devices.
•
raidcom commands (commands for setting configurations)
•
horctakeover, horctakeoff, paircurchk, paircreate, pairsplit, pairresync,
pairvolchk, pairevtwait, pairsyncwait, pairmon
•
raidscan (-find verify, -find inst, -find sync except for [d]), pairdisplay,
raidar, raidqry (except for -l and -r)
•
raidvchkset, raidvchkscan, raidvchkdsp
Relation between user authentication and resource groups
In user authentication mode, CCI verifies the access authority of the target
resource based on the user authentication and the role of it. Also, on the user
authentication unnecessary mode and the undefined resource groups, CCI
checks the access authorities shown in the following table.
Table 3-2 Relations between resource groups and command devices
Resources
Commands
pairXX
1
raidcom
Not
authenticated
user
2
Authenticated
user
Not
authenticated
user
2
Authenticated
user
Undefined
resource
3
Permitted
Permitted by the
authority of
resource ID 0
EX_EPPERM
4
Permitted by the
authority of
resource ID 0
Defined
resource
EX_EGPERM
4
Permitted by the
authority of the
target resource
ID
EX_EGPERM
4
EX_EPPERM
Permitted by the
authority of the
target resource
ID
3-10
CCI functions
Command Control Interface User and Reference Guide
Summary of Contents for HUS VM
Page 10: ...x Command Control Interface User and Reference Guide ...
Page 18: ...xviii Preface Command Control Interface User and Reference Guide ...
Page 78: ...2 50 CCI software environment Command Control Interface User and Reference Guide ...
Page 154: ...4 8 Starting up CCI Command Control Interface User and Reference Guide ...
Page 191: ...Provisioning operations with CCI 5 37 Command Control Interface User and Reference Guide ...
Page 280: ...6 56 Data replication operations with CCI Command Control Interface User and Reference Guide ...
Page 286: ...6 62 Data replication operations with CCI Command Control Interface User and Reference Guide ...
Page 302: ...7 16 Data protection operations with CCI Command Control Interface User and Reference Guide ...
Page 324: ...8 22 Examples of using CCI commands Command Control Interface User and Reference Guide ...
Page 524: ...9 200 Troubleshooting Command Control Interface User and Reference Guide ...
Page 529: ...Command Control Interface User and Reference Guide ...