Dell DX6000 Application Manual page 4

Dx object storage application guide version 5.0
Table of Contents

Advertisement

5.3.3. Other Normal READ Responses ................................................................... 25
5.4. Error Responses to READ ....................................................................................... 25
6. SCSP WRITE .................................................................................................................... 27
6.1. Introduction to WRITE ............................................................................................. 27
6.1.1. About the Expect: 100-continue Header and WRITE ....................................... 28
6.1.2. About Replicate On Write ............................................................................. 28
6.2. Named Object WRITE Details .................................................................................. 28
6.3. Unnamed Object WRITE Details .............................................................................. 28
6.4. Normal Responses to WRITE .................................................................................. 28
6.5. Error Responses to WRITE ..................................................................................... 29
7. SCSP DELETE .................................................................................................................. 31
7.1. Introduction to DELETE ........................................................................................... 31
7.2. Unnamed Object DELETE Details ............................................................................ 32
7.3. Named Object DELETE Details ............................................................................... 32
7.4. Normal Responses to DELETE ................................................................................ 32
7.5. Error Responses to DELETE ................................................................................... 33
8. SCSP UPDATE ................................................................................................................. 34
8.1. Introduction to UPDATE .......................................................................................... 34
8.2. Unnamed Object UPDATE Details ........................................................................... 34
8.3. Normal Responses to UPDATE ............................................................................... 35
9. SCSP COPY ..................................................................................................................... 36
9.1. Introduction to COPY .............................................................................................. 36
9.2. Unnamed Object COPY Details ............................................................................... 36
9.3. Normal Responses to COPY ................................................................................... 36
10. SCSP APPEND ............................................................................................................... 37
10.1. Introduction to APPEND ........................................................................................ 37
10.2. Unnamed Object APPEND Details ......................................................................... 38
10.3. Normal Responses to APPEND ............................................................................. 38
11. SCSP INFO ..................................................................................................................... 39
11.1. Introduction to INFO .............................................................................................. 39
11.1.1. Getting Replica Counts ............................................................................... 39
11.1.2. Getting Node Status and Cluster Capacity ................................................... 39
11.2. Unnamed Object INFO Details ............................................................................... 40
11.3. Normal Responses to INFO ................................................................................... 40
11.3.2. Normal INFO Responses for Named Objects ................................................ 41
11.3.3. Normal INFO Responses for Unnamed Objects ............................................ 42
11.4. Error Responses to INFO ...................................................................................... 42
12. Introduction to Object Security .......................................................................................... 43
12.1. About Security Roles ............................................................................................. 43
12.2. Security Realm Overview ....................................................................................... 44
12.2.1. Common Security Terminology .................................................................... 44
12.2.2. About Security Realms ............................................................................... 44
12.2.3. About Realm Caching and Security ............................................................. 44
12.3. About Authorization Header Syntax ........................................................................ 45
12.3.1. About Realm Names ................................................................................... 46
12.4. Authorization Specification Examples ...................................................................... 46
12.5. About Authorization Header Evaluation ................................................................... 47
12.6. Creating Realms ................................................................................................... 48
12.7. Updating the Realm on a Bucket ............................................................................ 49
12.8. Administrative Override and Security ...................................................................... 49
13. Managing Security for Application Developers ................................................................... 50
13.1. What Application Developers Need to Know ........................................................... 50
13.2. About Bucket Authorization .................................................................................... 50
Copyright © 2010 Caringo, Inc.
All rights reserved
iv
Version 5.0
December 2010

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dx6004sDx6012sDx object storage

Table of Contents