skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the System AdministratorSecurity for the System Administrator
go to beginning of chapter: Securing a ClusterSecuring a Cluster
 
go to next page: Building a Common EnvironmentBuilding a Common Environment
end of book navigation links

Overview of Clusters  



Clustered systems provide a uniform computing environmentthat is highly scalable, highly available, and secure. It is criticalthat there be a single set of authorized users and that these usersbe able to have processes executing on any cluster member.

To achieve a uniform computing environment, a cluster relieson the following components operating across all cluster members:

Within a cluster, authorization data for users and the securityprofiles of objects must be consistent across all nodes so thateach cluster member makes the same access control decision whenpresented with a particular user's access request for a particularobject. Building a Common Environment and Synchronizing Authorization Data describehow to achieve a single security domain.


 
go to next page: Building a Common EnvironmentBuilding a Common Environment