|Skip Navigation Links|
|Exit Print View|
|Oracle Solaris Cluster Geographic Edition Security Guide Oracle Solaris Cluster 4.0|
This section contains information about specific security mechanisms offered by Geographic Edition.
A secure installation uses the following critical security features:
Role-Based Access Control (RBAC) – Geographic Edition software bases its RBAC profiles on the RBAC rights profiles that are used in the Oracle Solaris Cluster software. If you are not a superuser, use the RBAC roles of solaris.cluster.geo.modify, solaris.cluster.geo.admin, and solaris.cluster.geo.read to access the cluster. For more information, see Geographic Edition Software and RBAC in Oracle Solaris Cluster Geographic Edition System Administration Guide.
Security Certificates – During installation, the cluster is configured for secure cluster communication by using security certificates (nodes within the same cluster must share the same security certificates). The communication is secured through the Java Management Extensions (JMX) port with Secure Sockets Layer (SSL) and security certificates. For more information, see Configuring Trust Between Partner Clusters in Oracle Solaris Cluster Geographic Edition Installation Guide.
Common Agent Container – To enable a zone cluster to function as a member of a Geographic Edition partnership, the common agent container must be manually configured within the zone cluster. For more information, see Preparing a Zone Cluster for Partner Membership in Oracle Solaris Cluster Geographic Edition Installation Guide.