HP OpenVMS Guide to System Security > Chapter 11 Securing a ClusterOverview of Clusters
Clustered systems provide a uniform computing environment that is highly scalable, highly available, and secure. It is critical that there be a single set of authorized users and that these users be able to have processes executing on any cluster member. To achieve a uniform computing environment, a cluster relies on the following components operating across all cluster members:
Within a cluster, authorization data for users and the security profiles of objects must be consistent across all nodes so that each cluster member makes the same access control decision when presented with a particular user's access request for a particular object. “Building a Common Environment” and “Synchronizing Authorization Data” describe how to achieve a single security domain. |