Top
ETERNUS SFAdvancedCopy Manager 14.0 Operator's Guide

3.4 Security Operation in Cluster Configuration

To use an authentication mechanism in a cluster system, note the following points that do not apply to regular operation: