C.1 Security Features

The following table contains a summary of the security features of Business Continuity Clustering 1.1:

Table C-1 Business Continuity Clustering 1.1 Security Features

Feature

Yes/No

Details

Users are authenticated

Yes

Administrative users are authenticated via eDirectory™.

Users are authorized

Yes

Users are authorized via eDirectory trustees.

Access to configuration information is controlled

Yes

Access to the administrative interface is restricted to valid users that have write rights to the configuration files.

Roles are used to control access

Yes

Configurable through iManager.

Logging and/or security auditing is done

Yes

Syslog on Linux. Fake syslog on NetWare.

Data on the wire is encrypted by default

Yes

The following data is encrypted on the wire:

  • Inter-cluster communications

  • Identity Manager data can be encrypted

Data stored is encrypted

No

Passwords, keys, and any other authentication materials are stored encrypted

Yes

Inter-cluster communications for usernames and passwords are encrypted. Cluster credentials are stored encrypted in eDirectory.

Security is on by default

Yes