Search

25.3. Setting up the Challenge-Handshake Authentication Protocol

download PDF
After configuring an ACL and creating an iSCSI initiator, set up the Challenge-Handshake Authentication Protocol (CHAP). For more information on configuring an ACL and creating an iSCSI initiator, see Section 25.1.6, “Configuring ACLs” and Section 25.2, “Creating an iSCSI Initiator”.
The CHAP allows the user to protect the target with a password. The initiator must be aware of this password to be able to connect to the target.

Procedure 25.8. Setting up the CHAP for target

  1. Set attribute authentication:
    /iscsi/iqn.20...mple:444/tpg1> set attribute authentication=1
    
    Parameter authentication is now '1'.
    
  2. Set userid and password:
    /iscsi/iqn.20...mple:444/tpg1> set auth userid=redhat
    
    Parameter userid is now 'redhat'.
    
    /iscsi/iqn.20...mple:444/tpg1> set auth password=redhat_passwd
    
    Parameter password is now 'redhat_passwd'.
    

Procedure 25.9. Setting up the CHAP for initiator

  1. Edit the iscsid.conf file:
    • Enable the CHAP authentication in the iscsid.conf file:
      # vi /etc/iscsi/iscsid.conf
      
      node.session.auth.authmethod = CHAP
      
      By default, the node.session.auth.authmethod option is set to None.
    • Add target user name and password in the iscsid.conf file:
      node.session.auth.username = redhat
      node.session.auth.password = redhat_passwd
  2. Restart the iscsid service:
    # systemctl restart iscsid.service
For more information, see the targetcli and iscsiadm man pages.
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.