Built-in Identity Management
AIStor includes a built-in identity management system for managing users and groups directly within your deployment. You can manage human and application users with either the AIStor Client command-line tool or the AIStor console. This page describes how to manage users with the AIStor Client.
Built-in users authenticate directly to AIStor using their credentials. These identities exist together with any configured external identity providers.
For information on configuring external identity providers, see:
Create a user
-
Run the
mc admin user addcommand:mc admin user add ALIAS ACCESSKEY SECRETKEYReplace each of the following with the desired value:
-
ALIASis thealiasof the AIStor deployment. -
ACCESSKEYis the username for the user account. -
SECRETKEYis the password for the user account.
Follow your company guidelines or requirements for uniqueness, randomness, and length when specifying the username and password.
If needed, you can later retrieve the account username with the
mc admin user infocommand. You cannot retrieve the password after the account is created. -
-
Run
mc admin policy attachto attach an AIStor policy to the new user. The following command assigns the built-inreadwritepolicy:mc admin policy attach ALIAS readwrite --user=USERNAMEReplace
USERNAMEwith the value you assigned in the previous step.
Delete a user
Run the mc admin user rm command:
mc admin user rm ALIAS USERNAME
where the value of:
-
ALIASis thealiasof the AIStor deployment. -
USERNAMEis the name of the user to remove.
User passwords
Users can change their own passwords at any time, regardless of their assigned policies.
To change a password, run mc admin user add with the existing username and the new password:
mc admin user add ALIAS USERNAME NEWPASSWORD
Replace USERNAME with the existing username and NEWPASSWORD with the new password.
Users cannot modify other users’ accounts without the appropriate administrative permissions.
Manage groups
Groups provide a simplified method for managing shared permissions among users with common access patterns and workloads.
Create and manage groups with the mc admin group command.
For example, consider the following groups. Each group is assigned a built-in policy or supported policy action. Each group includes one or more users.
| Group | Policy | Members |
|---|---|---|
Operations |
readwrite on finance bucketreadonly on audit bucket |
john.doe, jane.doe |
Auditing |
readonly on audit bucket |
jen.doe, joe.doe |
Admin |
admin:* |
greg.doe, jen.doe |
Each user’s total set of permissions consists of their explicitly assigned permissions and the inherited permissions from each of their assigned groups.
By default, AIStor denies access to any resource or operation not explicitly allowed by a user’s assigned or inherited policies.