Top
ETERNUS SF AdvancedCopy Manager 14.2 Operator's Guide

3.4 Security Operation in Cluster Configuration

To use an authentication mechanism in a cluster system, note the following points that do not apply to regular operation: