AFS has several benefits over traditional networked file systems, particularly in the areas of security and scalability. One enterprise AFS deployment at Morgan Stanley exceeds 25,000 clients. AFS uses Kerberos for authentication, and implements access control lists on directories for users and groups. Each client caches files on the local filesystem for increased speed on subsequent requests for the same file. This also allows limited filesystem access in the event of a server crash or a network outage. AFS uses the Weak Consistency model. Read and write operations on an open file are directed only to the locally cached copy. When a modified file is closed, the changed portions are copied back to the file server. Cache consistency is maintained by callback mechanism. When a file is cached, the server makes a note of this and promises to inform the client if the file is updated by someone else. Callbacks are discarded and must be re-established after any client, server, or network failure, including a timeout. Re-establishing a callback involves a status check and does not require re-reading the file itself. A consequence of the file locking strategy is that AFS does not support large shared databases or record updating within files shared between client systems. This was a deliberate design decision based on the perceived needs of the university computing environment. For example, in the original email system for the Andrew Project, the Andrew Message System, a single file per message is used, like maildir, rather than a single file per mailbox, like mbox. See AFS and buffered I/O Problems for handling shared databases A significant feature of AFS is the volume, a tree of files, sub-directories and AFS mountpoints. Volumes are created by administrators and linked at a specific named path in an AFS cell. Once created, users of the filesystem may create directories and files as usual without concern for the physical location of the volume. A volume may have a quota assigned to it in order to limit the amount of space consumed. As needed, AFS administrators can move that volume to another server and disk location without the need to notify users; the operation can even occur while files in that volume are being used. AFS volumes can be replicated to read-only cloned copies. When accessing files in a read-only volume, a client system will retrieve data from a particular read-only copy. If at some point, that copy becomes unavailable, clients will look for any of the remaining copies. Again, users of that data are unaware of the location of the read-only copy; administrators can create and relocate such copies as needed. The AFS command suite guarantees that all read-only volumes contain exact copies of the original read-write volume at the time the read-only copy was created. The file name space on an Andrew workstation is partitioned into a shared and local name space. The shared name space is identical on all workstations. The local name space is unique to each workstation. It only contains temporary files needed for workstation initialization and symbolic links to files in the shared name space. The Andrew File System heavily influenced Version 4 of Sun Microsystems' popular Network File System. Additionally, a variant of AFS, the Distributed File System was adopted by the Open Software Foundation in 1989 as part of their Distributed Computing Environment. Finally AFS is the predecessor of the Codafile system.
Implementations
There are three major implementations, Transarc, OpenAFS and Arla. Transarc software is now deprecated and is losing support. A fourth implementation exists in the Linux kernelsource code since at least version 2.6.10. Committed by Red Hat, this is a fairly simple implementation still in its early stages of development and therefore incomplete as of January 2013.
Available permissions
The following Access Control List permissions can be granted: ;Lookup ;Insert ;Delete ;Administer Permissions that affect files and subdirectories include: ;Read ;Write ;Lock Additionally, AFS includes Application ACLs - which have no effect on access to files.