IBM SG24-5131-00 사용자 설명서

다운로드
페이지 240
Special RS/6000 SP Topics 
187
After that, identify the HACWS event scripts to HACMP by executing the 
/usr/sbin/hacws/spcw_addevents 
command, and verify the configuration with the 
/usr/sbin/hacws/hacws_verify 
command. You should also check the cabling from the backup cws with the
/usr/sbin/hacws/spcw_verify_cabling 
command. Then reboot the primary and the backup cws, one after the other, 
and start cluster services on the primary cws with 
smit clstart
. After cluster 
services is up and running, check that control workstation services, such as 
SDRGetObjects
, are working as expected. If everything is fine, start up cluster 
services on the backup cws as well. Check for the completion of the cluster 
services startup with the following command:
grep "SPCW_APPS COMPLETE" /tmp/hacmp.out
 
Now you can cause a failover by stopping cluster services on the primary cws 
and see whether cws services are still available afterwards.
9.2  Kerberos Security
To understand security, we have to clarify some definitions first. 
Identification
is the process by which an entity tells another who it is.
Authentication is the process by which the other entity verifies this identity.
Authorization
is the process performed by an entity to check if an agent, 
whose identity has previously been authenticated, has or 
does not have the necessary privileges to carry out some 
action.
Additionally, if information is transferred over an insecure network, as any 
TCP/IP network basically is, there is always a chance that someone is 
listening, so some sort of encryption is required.
These issues are solved with kerberos.