The following table contains a summary of the security features of Novell Business Continuity Clustering.
Table 11-1 Business Continuity Clustering Security Features
Feature |
Yes/No |
Details |
---|---|---|
Users are authenticated |
Yes |
Administrative users are authenticated via eDirectory. For information about configuring rights needed by BCC administrators, see Section 4.8, eDirectory 9.1. |
Users are authorized |
Yes |
Users are authorized via eDirectory trustees. |
Access to configuration information is controlled |
Yes |
Access to the administrative interface is restricted to valid users who have write rights to the configuration files. |
Roles are used to control access |
Yes |
Configurable through iManager. |
Logging or security auditing is done |
Yes |
Syslog on Linux. |
Data on the wire is encrypted by default |
Yes |
The following data is encrypted on the wire:
|
Data stored is encrypted |
No |
|
Passwords, keys, and any other authentication materials are stored encrypted |
Yes |
Inter-cluster communications for user names and passwords are encrypted. Cluster credentials are stored encrypted in eDirectory. |
Security is on by default |
Yes |
|