The following table contains a summary of the security features of Business Continuity Clustering 1.1:
Table C-1 Business Continuity Clustering 1.1 Security Features
|
Feature |
Yes/No |
Details |
|---|---|---|
|
Users are authenticated |
Yes |
Administrative users are authenticated via eDirectory™. |
|
Users are authorized |
Yes |
Users are authorized via eDirectory trustees. |
|
Access to configuration information is controlled |
Yes |
Access to the administrative interface is restricted to valid users that have write rights to the configuration files. |
|
Roles are used to control access |
Yes |
Configurable through iManager. |
|
Logging and/or security auditing is done |
Yes |
Syslog on Linux. Fake syslog on NetWare. |
|
Data on the wire is encrypted by default |
Yes |
The following data is encrypted on the wire:
|
|
Data stored is encrypted |
No |
|
|
Passwords, keys, and any other authentication materials are stored encrypted |
Yes |
Inter-cluster communications for usernames and passwords are encrypted. Cluster credentials are stored encrypted in eDirectory. |
|
Security is on by default |
Yes |