Skip to content

Commit

Permalink
Add customer application server to security models
Browse files Browse the repository at this point in the history
  • Loading branch information
amozoss committed Oct 24, 2023
1 parent 153f32c commit 7a729f6
Showing 1 changed file with 11 additions and 1 deletion.
12 changes: 11 additions & 1 deletion app/learn/concepts/security-models/page.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,17 @@ metadata:
description: Explore Storj's diverse data access solutions from public Linksharing to encrypted S3 credentials, ensuring optimal security for your storage needs.
---

Storj provides multiple data access methods: "Linksharing" for public links, "Presigned URLs" for time-limited access, "Customer-specific S3 Credentials" for personalized encryption, and "Rotating Credentials" for broader time-restricted access. Each offers distinct security levels.
Storj provides multiple data access methods: "Linksharing" for public links, "Presigned URLs" for time-limited access, "Customer-specific S3 Credentials" for personalized encryption, and "Rotating Credentials" for broader time-restricted access. You can use your own application server to have even finer control. Each offers distinct security levels and benefits.

## Customer Application Server

By incorporating Storj within your application server, you can exercise more granular control over data access, security, and governance. You essentially act as an intermediary between the client application and the Storj storage service. This approach offers a centralized method for controlling and monitoring data access. Below are some strategies for using or proxying Storj in the customer application server tier:

- Expose specific API endpoints that route to the various Storj services.
- Dynamically issue temporary credentials based on the user's role or other contextual information
- Caching Strategy to reduce the number of round trips to the Storj service or frequently accessed data
- Access Monitoring for auditing of access patterns
- Data Preprocessing for transformation or enrichment before storage or retrieval

## Linksharing

Expand Down

0 comments on commit 7a729f6

Please sign in to comment.