11.1 Security Features

The following table contains a summary of the security features of Novell Business Continuity Clustering.

Table 11-1 Business Continuity Clustering Security Features

Feature

Yes/No

Details

Users are authenticated

Yes

Administrative users are authenticated via eDirectory. For information about configuring rights needed by BCC administrators, see Section 4.8, eDirectory 9.2.8.

Users are authorized

Yes

Users are authorized via eDirectory trustees.

Access to configuration information is controlled

Yes

Access to the administrative interface is restricted to valid users who have write rights to the configuration files.

Roles are used to control access

Yes

Configurable through iManager.

Logging or security auditing is done

Yes

Syslog on Linux.

Data on the wire is encrypted by default

Yes

The following data is encrypted on the wire:

  • Inter-cluster communications

  • Identity Manager data can be encrypted

Data stored is encrypted

No

 

Passwords, keys, and any other authentication materials are stored encrypted

Yes

Inter-cluster communications for user names and passwords are encrypted. Cluster credentials are stored encrypted in eDirectory.

Security is on by default

Yes