Security Considerations
C
This section contains specific instructions on how to configure and maintain a business continuity
cluster in the most secure way possible.
Section C.1, "Security Features," on page 89
Section C.2, "Security Configuration," on page 89
Section C.3, "Other Security Considerations," on page 94
C.1 Security Features
The following table contains a summary of the security features of Business Continuity Clustering
1.1:
Business Continuity Clustering 1.1 Security Features
Table C-1
Feature
Users are authenticated
Users are authorized
Access to configuration information is
controlled
Roles are used to control access
Logging and/or security auditing is done
Data on the wire is encrypted by default
Data stored is encrypted
Passwords, keys, and any other
authentication materials are stored
encrypted
Security is on by default
C.2 Security Configuration
The following subsections provide a summary of security-related configuration settings for Business
Continuity Clustering 1.1:
Section C.2.1, "BCC Configuration Settings," on page 90
Section C.2.2, "Security Information for Other Products," on page 93
Yes/No
Details
Yes
Administrative users are authenticated via
eDirectory™.
Yes
Users are authorized via eDirectory trustees.
Yes
Access to the administrative interface is
restricted to valid users that have write rights
to the configuration files.
Yes
Configurable through iManager.
Yes
Syslog on Linux. Fake syslog on NetWare.
Yes
The following data is encrypted on the wire:
Inter-cluster communications
Identity Manager data can be encrypted
No
Yes
Inter-cluster communications for usernames
and passwords are encrypted. Cluster
credentials are stored encrypted in eDirectory.
Yes
C
Security Considerations
89
Need help?
Do you have a question about the BUSINESS CONTINUITY CLUSTERING 1.1 SP1 - 9-21-2010 ADMINISTRATION GUIDE FOR NOVELL OPEN ENTERPRISE SERVER 1 SP2 LINUX and is the answer not in the manual?
Questions and answers