JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle® ZFS Storage Appliance Security Guide
Oracle Technology Network
Library
PDF
Print View
Feedback
search filter icon
search icon

Document Information

Oracle ZFS Storage Appliance Security Overview

Initial installation

Physical Security

Administrative Model

ZFSSA Users

Access Control Lists (ACL)

Storage Area Network (SAN)

Data Services

NFS Authentication and Encryption Options

Security Modes

Kerberos Types

iSCSI

RADIUS Support

Server Message Block (SMB)

Active Directory (AD) Domain Mode Authentication

Workgroup Mode Authentication

Local Groups and Privileges

Administrative Operations via the Microsoft Management Console (MMC)

Virus Scan

Delay Engine for Timing Attacks

Data Encryption on the Wire

File Transfer Protocol (FTP)

Hypertext Transfer Protocol (HTTP)

Network Data Management Protocol (NDMP)

Remote Replication

Shadow Migration

SSH File Transfer Protocol (SFTP)

Trivial File Transfer Protocol (TFTP)

Directory Services

System Settings

Remote Administrative Access

Logs

More Information

Documentation Mapping

Shadow Migration

Shadow migration permits automatic data migration from external or internal sources and controls automatic background migration. Regardless of whether the service is enabled or not, data is migrated synchronously for in-band requests. The primary purpose of the service is to allow tuning of the number of threads dedicated to background migration.

NFS mounts on an NFS source are not under control of the ZFSSA user. Shadow migration mounts cannot be secure therefore; if the server expects a Kerberos or similar request the source mount is rejected.