IBM SG24-5131-00 Laptop User Manual


 
Special RS/6000 SP Topics 187
After that, identify the HACWS event scripts to HACMP by executing the
/usr/sbin/hacws/spcw_addevents
command, and verify the configuration with the
/usr/sbin/hacws/hacws_verify
command. You should also check the cabling from the backup cws with the
/usr/sbin/hacws/spcw_verify_cabling
command. Then reboot the primary and the backup cws, one after the other,
and start cluster services on the primary cws with
smit clstart. After cluster
services is up and running, check that control workstation services, such as
SDRGetObjects, are working as expected. If everything is fine, start up cluster
services on the backup cws as well. Check for the completion of the cluster
services startup with the following command:
grep "SPCW_APPS COMPLETE" /tmp/hacmp.out
Now you can cause a failover by stopping cluster services on the primary cws
and see whether cws services are still available afterwards.
9.2 Kerberos Security
To understand security, we have to clarify some definitions first.
Identification is the process by which an entity tells another who it is.
Authentication is the process by which the other entity verifies this identity.
Authorization is the process performed by an entity to check if an agent,
whose identity has previously been authenticated, has or
does not have the necessary privileges to carry out some
action.
Additionally, if information is transferred over an insecure network, as any
TCP/IP network basically is, there is always a chance that someone is
listening, so some sort of encryption is required.
These issues are solved with kerberos.