7 Security............................................................................................................110
Encryption ........................................................................................................................................112
Built-in OpenFlow controller..............................................................................................................113
REST authentication.........................................................................................................................114
UUID Authentication....................................................................................................................115
PKI Authentication.......................................................................................................................116
Local vs Remote Keystone..........................................................................................................116
Security .......................................................................................................................................117
Assigning a user to a role.......................................................................................................118
Service and admin tokens ..........................................................................................................120
Controller code verification ..............................................................................................................121
Revoking Trust .................................................................................................................................122
Revoking trust via CRL ...............................................................................................................122
SDN administrative REST API .........................................................................................................122
Security procedure ...........................................................................................................................125
Security best practices......................................................................................................................126
MAC group matching...................................................................................................................132
Prerequisites..........................................................................................................................132
Enabling MAC groups............................................................................................................133
Disabling MAC groups...........................................................................................................133
Backing up a controller ....................................................................................................................134
Backup operation ........................................................................................................................135
Backing up a controller ...............................................................................................................136
Restore operation .......................................................................................................................137
6
Contents
Need help?
Do you have a question about the HPE VAN SDN Controller 2.7 and is the answer not in the manual?
Questions and answers