IBM Books

Planning Volume 2, Control Workstation and Software Environment


Security across system partitions

There are rules that govern the setting of security attributes within a partition. These rules apply to the default single system partition as well as to each additional partition that you might create. Choosing authentication options explains those rules. The setting for AIX remote command authentication on the control workstation is the union of the related settings in all partitions. The setting of authentication method for SP trusted services on the control workstation is the union of the related settings in all partitions.

If you are planning to change your partition configuration, consider the following:

When an SP system is to be partitioned, you might have different security requirements in different partitions. If you use DCE security services, partition names can be appended to the group names in the spsec_overrides file to define different groups in different partitions. To accomplish this, use the :p option in the spsec_overrides file before configuring SP security services. See Chapter 6, Planning for security, particularly Preparing to configure SP trusted services to use DCE.


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]