Ceph authentication configuration
As a storage administrator, authenticating users and services is important to the security of the IBM Storage Ceph cluster. IBM Storage Ceph includes the Cephx protocol, as the default, for cryptographic authentication, and the tools to manage authentication in the storage cluster.
Prerequisites
Installed IBM Storage Ceph cluster
Reference