O'Reilly logo

IBM SONAS Best Practices by Shradha Nayak Thakare, Michael Taylor, John Tarella, John Sing, Joe Roa, Ravikumar Ramaswamy, Gabor Penzes, Bill Marshall, Mary Lovelace, David Denny, Balazs Benyovszky, Megan Gilge

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication
Configuring authentication is one of the most important tasks after successfully installing and configuring the IBM Scale Out Network Attached Storage (SONAS) system. Setting up authentication correctly is essential, because it is the entry point to data that is stored on the SONAS system for users. Authentication and authorization ensure data security.
This chapter includes the following information:

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required