The CLDB stores global configuration settings for Policy-Based Security. Before
creating any security policies, an administrator must designate a master security policy
cluster through the cldb.pbs.global.master option.
You can modify global configuration settings through the maprcli config
save command and the REST API.
| Parameter | Default | Description |
cldb.pbs.max.security.policy |
10000 |
Maximum number of configured security policies allowed. Prevents users from arbitrarily creating numerous security policies, which could impact performance. |
cldb.pbs.global.master |
0 |
(Required) Sets the master security policy cluster for
the global namespace. You can configure a cluster to perform one
of the following roles:
Note: Policy creation or
modification on a member cluster is not
allowed.
|
cldb.pbs.audit.only.policy.check |
0 |
Set the value to 1 to enforce permissive mode across all volumes in the cluster. In permissive mode, the system only enforces resource-level ACEs and POSIX mode bits. The system checks the security policies for access and audits access denied events, but does not actually deny access. See Volume-Level Security Policy Enforcement Mode. |
cldb.pbs.access.control.enabled |
1 |
Enables and disables policy access controls (ACEs set in security policies) at the cluster-level. Set to 0 to disable policy access checks across all volumes in the cluster. The DataAce enforcement mode is automatically enabled. See Disabling Policy Access Controls at the Cluster-Level and Volume-Level Security Policy Enforcement Mode for additional information. |
maprcli config save -values '{"cldb.pbs.global.master":"1"}'curl -k -X POST 'https://<hostname>:8443/rest/config/save?values={"cldb.pbs.global.master":"1"}' --user mapr:maprFrom the Control System, to set the cluster as the Master for security policies, perform the following steps:
cldb.pbs.global.master on this cluster should be
0.cldb.pbs.global.master to 0.cldb.pbs.global.master to
1.