Security
Repository file pool servers, CRR recovery servers, and FIFO servers provide authorization mechanisms that allow you to control the security of the data they manage. In addition to this basic support, repository file pool servers allow you to use an external security manager (ESM). An external security manager is not applicable to dedicated CRR recovery servers or FIFO servers. The authorizations an external security manager provides may coexist with the authorizations of the repository file pool server or replace them.
| Note: |
|---|
|
For a description of the possible combinations and types of file pool servers, see File Pool Administration Overview. |
This chapter is divided into three parts:
- The first part describes the authorization mechanisms supplied with file pool servers.
- The second part discusses using an external security manager to augment or replace the file pool authorization mechanisms. (This discussion is applicable to only repository file pool servers, not CRR recovery servers or FIFO servers.) File pool servers do not include an external security manager. Rather, they include facilities to allow you to route certain requests to an external security manager for authorization checking. Before trying to use an external security manager, you should understand the authorization mechanisms supplied with the repository file pool servers.
- The third part discusses the programming interface a file pool server provides to an ESM. (This discussion is applicable to only repository file pool servers, not dedicated CRR recovery servers or FIFO servers.) This information is provided to assist the programmer who is developing or modifying an ESM to work with the repository file pool server.