IBM Books

Administration Guide


|Secure remote commands authorization

|A secure remote command process can be enabled to be used by the PSSP |software instead of the AIX authenticated remote commands rsh and |rcp.

|You must have PSSP 3.4 and the secure remote command software |running on the control workstation, PSSP 3.2 or later on all the nodes, |and enable the restricted root access option before you can enable the secure |remote command process. Then you can proceed to the rest of the PSSP |security configuration.

|You must have already obtained, installed, and configured the secure remote |command software that you want to use on the control workstation. Your |secure remote command process must honor the following criteria: |


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]