Acknowledgment: Sandeep Patil (STSM, IBM Storage), Sunil Angadi (IBM Ceph Storage), Sayalee Raut (IBM Ceph Storage) and Deepak Thorat (IBM Security Verify)
Content
Introduction
Introduction -
IBM Storage Ceph provides an open, scalable, and software-defined multi-protocol storage solution designed to consolidate data anywhere, and the global data platform consolidates data everywhere. Engineered to be self-healing and self-managing with no single point of failure. IBM Storage Ceph is object storage optimized for enterprise, unified for simplicity, and software-defined for flexibility.
There is a need to secure the crown jewel data with a zero trust approach and hence access to IBM Ceph Storage configuration and dashboard also needs to be protected using second-factor authentication.
IBM Security Verify (ISV) protects users and applications both inside and outside the enterprise while enabling technical agility and operational efficiency as a cloud-native solution. Beyond single-sign-on and multi-factor authentication, Verify is a modernized, modular IDaaS that provides deep AI-powered context for risk-based authentication and adaptive access decisions, guided experiences for developer time-to-value, and comprehensive cloud Identity and Access Management (IAM) capabilities. From privacy and consent management to holistic risk detection and identity analytics, Verify centralizes workforce and consumer IAM for any hybrid cloud deployment.
In this article, we will see how IBM Storage Ceph and IBM Security Verify (ISV) can be configured to achieve the Single Sign On (SSO) and MFA for the Ceph GUI dashboard.
The deployment requires configuration at the IBM Security Verify end followed by IBM Ceph storage.
In the below sample example, we are using IBM Security Verify and Ceph Version 17.2.6 using SAML capabilities. (Same configuration and steps works with IBM Ceph as well)
In the below example, the Ceph admin user will log in to the Ceph dashboard which will redirect the user to ISV (due to SAML configuration). ISV has the identity to authenticate and at the same time, ISV is configured with an access policy that imposes Multi-factor authentication (MFA) for the Ceph Dashboard application. In this way, we achieve the Ceph admin user to be redirected to ISV for authentication and MFA.
Here ISV is the Identity provider and Ceph is a service provider and configured as an application on ISV - the identity provider needs to have identity so the user needs to be present there and the account of that user needs to be there on Ceph side.
IBM Security Verify (ISV) configuration:
We are going to use the ‘Custom application’ capability of ISV where the Ceph Dashboard will be registered as an application. Below are the steps that need to follow for ISV-Ceph SAML integration.
Step 1: Create Custom Application in ISV Admin console:
-
Login to the ISV Admin console and select Application tab -- > Click Add Application → Select Application type as Custom Application
-
In the Application Setting → General tab provide the Application name and Company name.
-
Then in the Sign-On tab select/ fill in below details:
Then Save the Application.
Below is a sample snapshot for your reference.
Note: Some of the above settings may change based on your requirements and system details.