skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the System Administrator Security for the System Administrator
go to beginning of chapter: Securing a Cluster Securing a Cluster
 
go to next page: Building a Common EnvironmentBuilding a Common Environment
end of book navigation links

Overview of Clusters  



Clustered systems provide a uniform computing environment that is highly scalable, highly available, and secure. It is critical that there be a single set of authorized users and that these users be able to have processes executing on any cluster member.

To achieve a uniform computing environment, a cluster relies on the following components operating across all cluster members:

Within a cluster, authorization data for users and the security profiles of objects must be consistent across all nodes so that each cluster member makes the same access control decision when presented with a particular user's access request for a particular object. Building a Common Environment and Synchronizing Authorization Data describe how to achieve a single security domain.


 
go to next page: Building a Common EnvironmentBuilding a Common Environment