|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] iSCSI: Requirements, Authentication is not AuthorizationAll, With iSCSI requirements presentation, there was confusion that authentication is the same as authorization. David Black indicated LUN access will be handled by SCSI CDBs to be defined by T10. Interposing an iSCSI controller seems to make poor use of the transport that also allows a proxy into other devices. Is there any description of how this scheme is intended to work? How is it to be integrated into iSCSI? Should authentication allow access to all resources? How does the client learn what resources are available? Discovery and authorization are one in the same in my opinion. Doug
Home Last updated: Tue Sep 04 01:06:06 2001 6315 messages in chronological order |