IBM SG24-5131-00 manual Kerberos Security

Models: SG24-5131-00

1 240
Download 240 pages 48.89 Kb
Page 205
Image 205

After that, identify the HACWS event scripts to HACMP by executing the

/usr/sbin/hacws/spcw_addevents

command, and verify the configuration with the

/usr/sbin/hacws/hacws_verify

command. You should also check the cabling from the backup cws with the

/usr/sbin/hacws/spcw_verify_cabling

command. Then reboot the primary and the backup cws, one after the other, and start cluster services on the primary cws with smit clstart. After cluster services is up and running, check that control workstation services, such as SDRGetObjects, are working as expected. If everything is fine, start up cluster services on the backup cws as well. Check for the completion of the cluster services startup with the following command:

grep "SPCW_APPS COMPLETE" /tmp/hacmp.out

Now you can cause a failover by stopping cluster services on the primary cws and see whether cws services are still available afterwards.

9.2 Kerberos Security

To understand security, we have to clarify some definitions first.

Identification is the process by which an entity tells another who it is.

Authentication is the process by which the other entity verifies this identity.

Authorization is the process performed by an entity to check if an agent, whose identity has previously been authenticated, has or does not have the necessary privileges to carry out some action.

Additionally, if information is transferred over an insecure network, as any TCP/IP network basically is, there is always a chance that someone is listening, so some sort of encryption is required.

These issues are solved with kerberos.

Special RS/6000 SP Topics 187

Page 205
Image 205
IBM SG24-5131-00 manual Kerberos Security