×

System and method for secure multi-tenancy in an operating system of a storage system

  • US 9,471,803 B2
  • Filed: 08/07/2014
  • Issued: 10/18/2016
  • Est. Priority Date: 08/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for providing secure multi-tenancy in a storage system, the method comprising:

  • creating, by a secure multi-tenancy (SMT) engine executed by a processor, a set of tenant-units (TUs), wherein each of the TUs is associated with a tenant, each TU representing a user group, each user group having a plurality of users associated with the tenant;

    associating by the SMT engine one or more file system management objects (FSMOs) with one or more TUs of the set of TUs, wherein each FSMO contains namespace information of a particular tenant;

    associating by the SMT engine one or more users with one or more TUs of the set of TUs;

    maintaining, by a protocol engine executed by the processor, a protocol config-metadata store based on the association of one or more FSMOs with one or more TUs, and further based on the association of one or more users with one or more TUs;

    in response to a first request from a first user to access a first FSMO of a first TU;

    determining by the protocol engine whether the first user is authorized to access the first FSMO based on information of the protocol config-metadata store, including identifying a set of one or more TUs that are associated with the first user, determining whether the first TU is included in the set of one or more TUs, determining whether the first FSMO is included in a set of one or more FSMOs that are associated with the first TU, in response to determining that the first TU is included in the set of TUs associated with the first user;

    in response to the protocol config-metadata store indicating the first user is authorized to access the first FSMO, allowing the first user to access the first FSMO; and

    in response to a second request from the first user to perform a first operation on a first object;

    determining whether the first user is authorized to perform the first operation by obtaining a first set of one or more operation IDs associated with the first user from a security config-metadata store and determining an operation ID identifying the requested first operation matches at least one of the operation IDs in the first set of one or more operation IDs obtained from the security config-metadata store.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×