Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Introduction to the ACL list of zookeeper

2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/02 Report--

This article mainly introduces "zookeeper's ACL list introduction". In daily operation, I believe many people have doubts about the introduction of zookeeper's ACL list. The editor consulted all kinds of materials and sorted out simple and easy-to-use methods of operation. I hope it will be helpful to answer the doubts of "zookeeper's ACL list introduction"! Next, please follow the editor to study!

Znode contains two parts: data and state, which contains ACL information

ACL data structure

Attributes:

Perms

Id (id,schema)

Built-in permissions, ACL list, id,schema

ACL create modify ACL verify ACL modify verify ACL request permission

The status information ACL list in znode is very similar to the permission control in UNIX, but the difference is that node permissions exist independently.

Node permissions have no recursive attribution relationship

ACL corresponds to a specific node and does not apply to its child nodes

ACL is made up of schema:expression,perms pairs.

ACL data structure, data dependency

The summary of Id corresponds as follows:

Schema

Id

Meaning

Remarks

Auth

"

Do not use any id to represent any confirmed user

Bring your own Id

World

Anyone

Fixed users, opening permissions for all Client sides

Bring your own Id

Super

"

Have super privileges and can do anything (cdrwa)

Bring your own Id

Ip

No fixed value, fixed format (ip expression)

IP authentication mode

Bring your own schema

Digest

No fixed value, fixed format (digest expression)

User name and password authentication, and then generate summary

Bring your own schema

Sasl

No fixed value, fixed format (sasl expression)

Sasl verification method, which I don't understand very well.

Bring your own schema

ACL creation and modification ACL verification verification of ACL creation and modification

Validate schemes and ids when create and setACL creation and modification are involved in the PrepRequestProcessor class

Think about:

The relationship between ACL and Id? Is the inclusion relationship, is the description of data permissions in acl

There are many types of permissions, how to manage and check?

At this point, the study of "introduction to the ACL list of zookeeper" is over. I hope to be able to solve your doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report