The following table contains a summary of the security features of Novell® Business Continuity Clustering 1.2:
Table 13-1 Business Continuity Clustering 1.2 Security Features
Feature |
Yes/No |
Details |
---|---|---|
Users are authenticated |
Yes |
Administrative users are authenticated via Novell eDirectory™. For information about configuring rights needed by BCC administrators, see Section 4.1.5, Novell eDirectory 8.8. |
Users are authorized |
Yes |
Users are authorized via eDirectory trustees. |
Access to configuration information is controlled |
Yes |
Access to the administrative interface is restricted to valid users who have write rights to the configuration files. |
Roles are used to control access |
Yes |
Configurable through iManager. |
Logging and/or security auditing is done |
Yes |
Syslog on Linux. |
Data on the wire is encrypted by default |
Yes |
The following data is encrypted on the wire:
|
Data stored is encrypted |
No |
|
Passwords, keys, and any other authentication materials are stored encrypted |
Yes |
Inter-cluster communications for usernames and passwords are encrypted. Cluster credentials are stored encrypted in eDirectory. |
Security is on by default |
Yes |
|