Secure communication between the proxy server and other backend servers

Use this feature to establish secure communication between the proxy server and the backend Swift Object Storage servers.

By default, object-server, object-server-sof, container-server, and account-server do not have authentication for the requests that they are serving. Processes, including the proxy-server that are connecting to these servers over their listening ports, can send requests that can result into updating the database and altering the object data on disk. Extra security between these servers can be enabled. Requesting process signs a request with a secret key kept in swift.conf. This key is verified by the serving object, container, or account server. To enable this feature, set:
mmobj config change --ccrfile swift.conf --section node_communication --property secure --value true
The signing middleware is added to proxy-server and the validating middleware is added to object-server, object-server-sof, container-server, and account-server. If the secret key is not present in swift.conf, it is randomly chosen and set to key secure_communication_secret under node_communication section. In a multi-region environment, this key must be reset and kept common in all the clusters.
To revert to the original configuration, set:
mmobj config change --ccrfile swift.conf --section node_communication --property secure --value false
Note: Disable SSH access on the protocol nodes on the IBM Storage Scale cluster for the users that have the same UID and GID as the local swift user.