The following table contains a summary of the security features of Business Continuity Clustering 1.1:
Table C-1 Business Continuity Clustering 1.1 Security Features
Feature |
Yes/No |
Details |
---|---|---|
Users are authenticated |
Yes |
Administrative users are authenticated via eDirectory™. |
Users are authorized |
Yes |
Users are authorized via eDirectory trustees. |
Access to configuration information is controlled |
Yes |
Access to the administrative interface is restricted to valid users that have write rights to the configuration files. |
Roles are used to control access |
Yes |
Configurable through iManager. |
Logging and/or security auditing is done |
Yes |
Syslog on Linux. Fake syslog on NetWare. |
Data on the wire is encrypted by default |
Yes |
The following data is encrypted on the wire:
|
Data stored is encrypted |
No |
|
Passwords, keys, and any other authentication materials are stored encrypted |
Yes |
Inter-cluster communications for usernames and passwords are encrypted. Cluster credentials are stored encrypted in eDirectory. |
Security is on by default |
Yes |