Standard security mode
In standard security mode, PowerHA® SystemMirror® authenticates requests for incoming connections by checking the source IP address, the port number, and user privilege.
Remote command execution for commands in /usr/es/sbin/cluster uses the principle of least privileged. This ensures that no arbitrary command can run on a remote node with root privilege. A select set of PowerHA SystemMirror commands are considered trusted and allowed to run as root; all other commands run as user nobody.
The dependency on rsh and the ~/.rhosts file to configure host access has been eliminated. Although this file is optional, some commands external to PowerHA SystemMirror - for example user-defined event scripts and user programs - may still require an ~/.rhosts file. PowerHA SystemMirror now relies on an internal PowerHA SystemMirror trusted host file, /etc/cluster/rhosts to authenticate PowerHA SystemMirror communications.
To manage inter-node communications, the Cluster Communications daemon requires a list of valid cluster IP labels or addresses to use. There are two ways to provide this information:
- Automatic node configuration
- Individual node configuration (more secure).