beautypg.com

Symantec Veritas 5 User Manual

Page 53

background image

To configure VCS clusters in secure mode (optional), you need:

The name of the Root Broker system

Example: east

See

“About Symantec Product Authentication Service

(AT)”

on page 19.

Access to the Root Broker system without use of a
password.

For automatic mode (default)

The path for the encrypted files that you get from the
Root Broker administrator.

See

“Creating encrypted files for the security

infrastructure”

on page 35.

For semiautomatic mode
using encrypted files

The fully-qualified hostname (FQDN) of the Root
Broker . (e.g. east.symantecexample.com)

The given example puts a system in the (DNS)
domain symantecexample.com with the unqualified
hostname east, which is designated as the Root
Broker.

The root broker’s security domain (e.g.

[email protected])

The root broker’s port (e.g. 2821)

The path to the local root hash (e.g.

/var/tmp/privatedir/root_hash)

The authentication broker’s principal name on each
cluster node (e.g. galaxy.symantecexample.com

and nebula.symantecexample.com)

For semiautomatic mode
without using encrypted files

To add VCS users, which is not required if you configure your cluster in secure
mode, you need:

VCS usernames are restricted to 1024 characters.

Example: smith

User names

VCS passwords are restricted to 255 characters.

Enter the password at the prompt.

User passwords

Users have three levels of privileges: A=Administrator,
O=Operator, or G=Guest.

Example: A

To decide user privileges

To configure SMTP email notification (optional), you need:

53

Installing and configuring VCS

Getting your VCS installation and configuration information ready