How Does Ceph Authenticate Users » History » Version 1
Jessica Mack, 06/03/2015 03:22 AM
1 | 1 | Jessica Mack | h1. How Does Ceph Authenticate Users |
---|---|---|---|
2 | |||
3 | h3. Resolution |
||
4 | |||
5 | Ceph provides an authentication framework called %{color:grey}cephx% that operates in a manner similar to Kerberos. The principal difference is that Ceph’s authentication system is distributed too, so that it doesn’t constitute a single point of failure. For details, see "Ceph Authentication & Authorization":http://ceph.com/docs/master/rados/operations/auth-intro. |