Excluded Users; Security Equivalent User - Novell BUSINESS CONTINUITY CLUSTERING 1.2 - ADMINISTRATION Administration Manual

Table of Contents

Advertisement

7 In the Authentication context field, view and if necessary change the port numbers next to the
IP address.
For example, the Authentication context field might contain a value similar to
10.1.1.12:2003:2003. In this example, the first port number (2003) is the port number for the
corresponding Identity Manager driver on the cluster that this cluster is synchronizing with.
The second port number (2003) is the port number for the Identity Manager driver on this
cluster.
These port numbers should be the same, but should not be the same as the port numbers for
other Identity Manager drivers on either this or the remote cluster.
8 If you change the port numbers, restart the driver by clicking the upper right corner of the
Cluster Sync or User Sync icon (whichever you have chosen), then click Restart driver.
9 If you changed the port number in
corresponding driver in the other cluster.
You can do this by repeating
cluster.

12.5 Excluded Users

If certain users do not synchronize between clusters, it is possible that those users are in the
excluded users list.
NOTE: The eDirectory Admin user should never be synchronized between clusters.
To see the excluded users list:
1 Start your Internet browser and enter the URL for iManager.
The URL is http://server_ip_address/nps/iManager.html. Replace server_ip_address with the
IP address or DNS name of the server that has iManager and the Identity Manager
preconfigured templates for iManager installed.
2 Specify your username and password, specify the tree where you want to log in, then click
Login.
3 In Roles and Tasks, click Identity Manager, then click the Identity Manager Overview link.
4 Select Search Entire Tree, then click Search.
5 Select the user synchronization driver you want to check by clicking the blue User Sync icon.
This is not necessary for the cluster synchronization driver.
6 Click the blue icon again, then click the Identity Manager tab if it is not already selected.
7 Click Excluded Users, then view, add, or remove users as desired.

12.6 Security Equivalent User

If resources or peers do not appear in peer clusters in your BCC, it is possible that either a cluster or
user synchronization driver is not security equivalent to a user with administrative rights to the
cluster.
110 BCC 1.2: Administration Guide for OES 2 SP1 Linux
Step 7
above, change the port numbers to be the same for the
Step 1
through
Step 8
for the Identity Manager driver on the other

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the BUSINESS CONTINUITY CLUSTERING 1.2 - ADMINISTRATION and is the answer not in the manual?

Questions and answers

Table of Contents