Failover steps for authentication data

Use the following steps on a protocol node in the secondary cluster to fail over the authentication configuration.

  1. Save the current file authentication information on the secondary cluster.
  2. Remove file authentication from the secondary cluster.
  3. Restore file authentication on the secondary cluster based on the information that is saved in step 1.