LEADER 03135nam 22005534a 450 001 9910454597903321 005 20200520144314.0 035 $a(CKB)1000000000522938 035 $a(SSID)ssj0000941832 035 $a(PQKBManifestationID)11967093 035 $a(PQKBTitleCode)TC0000941832 035 $a(PQKBWorkID)10964363 035 $a(PQKB)11741477 035 $a(MiAaPQ)EBC3306712 035 $a(CaSebORM)0738427896 035 $a(Au-PeEL)EBL3306712 035 $a(CaPaEBR)ebr10112805 035 $a(OCoLC)560315618 035 $a(EXLCZ)991000000000522938 100 $a20031015d2002 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 03$aAn introduction to security in a CSM 1.3 for AIX 5L environment$b[electronic resource] /$f[Octavian Lascu ... et al.] 205 $a1st ed. 210 $a[S.l.] $cIBM International Technical Support Organization$d2002 215 $axiv, 100 p. $cill 225 1 $aIBM redbooks 300 $a"December 2002." 300 $a"SG24-6873-00." 311 $a0-7384-2789-6 320 $aIncludes bibliographical references and index. 330 $aThis IBM Redbooks publication contains information about the first official release of the new clustering software IBM Cluster Systems Management (CSM) on AIX 5L Version 5.2. Features include base cluster configuration and management, Resource Monitoring and Control (RMC), subsystem access control list setup for shipped CSM resource managers, hardware control, configuration file management, distributed command execution, and a distributed GUI based on the AIX WebSM infrastructure. Included in this release of CSM is a complete set of base security functions based on IBM host-based authentication (HBA) and offered through an abstraction layer in the CSM software. CSM automatically configures HBA for use by the cluster services and establishes secure cluster communications for the shipped CSM resource managers. The first part of this publication is conceptual and includes an introduction to security for CSM 1.3 for AIX 5L, security concepts and components, and CSM security infrastructure. Next, practical security considerations are provided. Topics, such as network considerations, security in an heterogeneous environment, and security considerations for hardware control, are discussed. The last part of this publication details secure remote command execution, as well as security administration. Among the topics covered are remote command execution software, OpenSSH installation, and administration of RMC. 410 0$aIBM redbooks. 606 $aComputer security 608 $aElectronic books. 615 0$aComputer security. 676 $a005.8 701 $aLascu$b Octavian$0883687 712 02$aInternational Business Machines Corporation.$bInternational Technical Support Organization. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910454597903321 996 $aAn introduction to security in a CSM 1.3 for AIX 5L environment$92474364 997 $aUNINA