Failover steps for authentication data
Use the following steps on a protocol node in the secondary cluster to fail over the authentication configuration.
- Save the current file authentication information on the secondary cluster.
- Remove file authentication from the secondary cluster.
- Restore file authentication on the secondary cluster based on the information that is saved in step 1.