Sun OTP 2.0 supports the following features:
Sun OTP 2.0 supports multiple installation scenarios. You can install Sun OTP 2.0 in the following scenarios on:
Stand-alone system without zones
Stand-alone system with zones
Stand-alone system with logical domains
Clustered system without zones
Clustered system with zones
You can upgrade from Sun OTP version 1.1 to version 2.0 using the standard, quantum leap, or live upgrade method.
Standard Upgrade – Shuts down the cluster before upgrading the cluster nodes. Restart the cluster after all the nodes are fully upgraded.
Quantum Leap Upgrade – Divides the cluster into two groups of nodes. Bring down one group of nodes and upgrade them. The other group of nodes continues to provide services. After you complete upgrade of the first group of nodes, switch services to those upgraded nodes. You can then upgrade the remaining nodes and boot them back into the rest of the cluster. The cluster outage time is limited to the amount of time needed for the cluster to switch over services to the upgraded partition.
Live Upgrade – Retains the previous cluster configuration until you have upgraded all nodes and commit to the upgrade. If the upgraded configuration causes a problem, revert to your previous cluster configuration until you can rectify the problem.
Sun OTP 2.0 provides an extended feature to back up and restore the Sun OTP services. You can back up an individual service or all running services for Sun OTP with the exception of services running on the remote host. Similarly, you can restore Sun OTP services only on the same host on which they were originally backed up.
Sun OTP 2.0 provides you the ability to administer Web Single Sign On (SSO) using the browser user interface (BUI) and the command-line interface (CLI). You can create new Web SSO users, change the password of existing users, and remove existing users.
Using Sun OTP 2.0, you can harden and unharden the Sun OTP host. Hardening is the process of modifying the SolarisTM operating system configuration to improve the network security of a system. By using the hardening process, you can close the ports and disable the services that might present a security risk to the system. You can unharden, that is, reopen the ports and enable the services that were closed by the hardening process.