© Copyright IBM Corp. 2002. All rights reserved. 1
Chapter 1. Introduction
This IBM Redbook provides an overview of the security environment in a
management domain cluster running IBM Cluster Systems Management (CSM)
1.3 for AIX 5L. We discuss the components and mechanisms that make the
cluster secure and the options for changing security methods. For a detailed
discussion of CSM 1.3 for AIX 5L installation configuration and management,
refer to
An Introduction to CSM 1.3 for AIX 5L,
SG24-6859.
In this chapter, we introduce security topics used in the IBM Cluster Systems
Management for IBM ^ Cluster 1600. We provide an overview of security
considerations and then discuss the security terms and components in CSM for
AIX.
1

Get An Introduction to Security in a CSM 1.3 for AIX 5L Environment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.