The image shows a junior cluster member and a senior cluster member that each contain a cluster service. Each member contains an access controller that secures the communication between the two members. The access controllers utilize JKS, Login Modules and Permissions files