Chapter 1. Introduction 5
Figure 1-3 Data transmission security
In the following sections, we discuss the security components in CSM 1.3 for
AIX.
1.2 Cluster Systems Management security basics
The security design of CSM is modular, with the intent of using security
components that exist today, and flexible enough to incorporate new
technologies and practices. The security infrastructure of CSM for AIX 1.3 is
enabled, by default, out of the box.
No special preparation is needed for the installation, except the standard network
and infrastructure planning. Some of the standard modules used are remote
shell and distributed shell for secure commands and IBM Reliable Scalable
Cluster Technology (RSCT) for secure resource authentication.
The following is a brief discussion of the main security components used in a
CSM for AIX cluster.
visa # 1234 5678 9012
visa # 1234 5678 9012
visa # 1234 5678 9012
visa # 1234 5678 9012
visa # 1234 5678 9012
visa # 1234 5678 9012
l6iw25wioelce
visa # 1234 5678 9012
l6iw25wioelce
l6iw25wioelce
Encryption
Decryption
What does this mean?
No encryption
data not secure
Encryption
data is secure
XYZ Company
XYZ Company

Get An Introduction to Security in a CSM 1.3 for AIX 5L Environment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.