Top
Symfoware Server V12.1.0 Cluster Operation Guide
FUJITSU Software

5.3 Security in Database Multiplexing

Database multiplexing mode replicates the database on all servers that comprise the cluster system. It achieves this by transferring and reflecting the updated transaction logs of the database from the primary server to the standby server.

To safeguard the database against unauthorized access and protect the confidentiality of data when transferring the transaction logs, carefully consider security and take note of the following:

Figure 5.5 Security

However, it may not always be possible to adopt the configuration mentioned above. For example, you may want to place the servers in a nearby/neighboring office to minimize network delays.

In this case, combine the following features to enhance security:

When these features are combined, security will be achieved as shown below.

Figure 5.6 Security achieved when standby server authentication is combined with transaction log encryption

See

Refer to "Performing Database Multiplexing" under "Configuring Secure Communication Using Secure Sockets Layer" in the Operation Guide for information on encrypting SSL communications.