Security Considerations; Security Features - Novell BUSINESS CONTINUITY CLUSTERING 1.1 SP2 - ADMINISTRATION Administration Manual

Table of Contents

Advertisement

Security Considerations

1 0
This section contains specific instructions on how to configure and maintain a business continuity
cluster in the most secure way possible. It contains the following subsections:
Section 10.1, "Security Features," on page 115
Section 10.2, "Security Configuration," on page 116
Section 10.3, "General Security Guidelines," on page 120
Section 10.4, "Security Information for Dependent Products," on page 120

10.1 Security Features

The following table contains a summary of the security features of Novell
Clustering 1.2:
Business Continuity Clustering 1.2 Security Features
Table 10-1
Feature
Users are authenticated
Users are authorized
Access to configuration information is
controlled
Roles are used to control access
Logging and/or security auditing is done
Data on the wire is encrypted by default
Data stored is encrypted
Passwords, keys, and any other
authentication materials are stored
encrypted
Security is on by default
Yes/No
Details
Yes
Administrative users are authenticated via
eDirectory™.
Yes
Users are authorized via eDirectory trustees.
Yes
Access to the administrative interface is
restricted to valid users who have write rights
to the configuration files.
Yes
Configurable through iManager.
Yes
Fake syslog.
Yes
The following data is encrypted on the wire:
Inter-cluster communications
Identity Manager data can be encrypted
No
Yes
Inter-cluster communications for usernames
and passwords are encrypted. Cluster
credentials are stored encrypted in eDirectory.
Yes
®
Business Continuity
Security Considerations
10
115

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the BUSINESS CONTINUITY CLUSTERING 1.1 SP2 - ADMINISTRATION and is the answer not in the manual?

Questions and answers

Table of Contents